Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in May 2010
<<   <   Page 2 / 2
iPhone App Helps Fight Identity Theft
Products and Releases  |  5/17/2010  | 
Mobile Active Defense is a Zero Footprint Security app for the iPhone/iPad
Accuvant Unveils New Data-Centric Security Framework
Products and Releases  |  5/17/2010  | 
Framework helps clients implement a DLP strategy
Survey: More Network Administrators Expect Increases Than Decreases In Security Budgets This Year
Products and Releases  |  5/13/2010  | 
Encouraging results from VanDyke Software's seventh annual "What Keeps Network Administrators Up At Night"
Real-Time Fraud Management Solution For Card Issuing Banks
Products and Releases  |  5/13/2010  | 
SoundBite Fraud Management Solution lets card issuers design interactive text, voice and email messaging strategies to automate card fraud resolution
Webroot Adds Vulnerability Scanning To Web Security Service
Products and Releases  |  5/13/2010  | 
Web Security Service offers weekly and monthly tests for more than 400 common vulnerabilities
Kanguru Rolls Out Cloud-Based Management For Secure USBs
Products and Releases  |  5/13/2010  | 
KRMC Cloud allows an administrator to remotely manage select encrypted Kanguru USB Flash Drives from anywhere in the world
Websense Releases Gateway That Combines Web Security, Data Loss Prevention, Appliance And SaaS
Products and Releases  |  5/13/2010  | 
Web Security Gateway Anywhere is part of the TRITON system
Trend Micro Announces PortalProtect 2.0
Products and Releases  |  5/11/2010  | 
PortalProtect adds advanced content-filtering for both file and Web content
Webroot Adds Vulnerability Scanning To Cloud-Based Web Security Service
Products and Releases  |  5/11/2010  | 
New service offers weekly and monthly tests for more than 400 common vulnerabilities
BeyondTrust Unveils PowerBroker For Virtualization To Secure Datacenter Initiatives
Products and Releases  |  5/11/2010  | 
Solution provides a unified solution to centrally address risks from undermanaged privileges in virtualized datacenter environments
Crossbeam, Check Point Expand Partnership
Products and Releases  |  5/11/2010  | 
Check Point will include Crossbeam’s X-Series security platform bundled with its Security Gateway Software Blades and VSX virtualized security gateway
iPad Spy Software Hits Market
Products and Releases  |  5/10/2010  | 
Retina-X Studios' Mobile Spy silently records the contents of all emails sent or received
Red Condor Software Update Targets Scams, Phishing, Image-based Spam
Products and Releases  |  5/10/2010  | 
New proprietary filters focused on eliminating 'Nigerian 419' scams, phishing and image-based spam
F5 Extends Application And Data Security To The Cloud
Products and Releases  |  5/10/2010  | 
BIG-IP Version 10.2 introduces new security functionality throughout the BIG-IP product family
Norton Offers Free Facebook Security Tool
Products and Releases  |  5/10/2010  | 
Norton Safe Web for Facebook uses site rating technology to scan computer users' Facebook newsfeeds for malicious Web links
SonicWALL Brings Web Application Firewall Service To SMB Market
Products and Releases  |  5/10/2010  | 
SonicWALL SSL VPN 4.0 protects Web applications, including the SSL VPN appliance itself, from the latest Web-based attacks
Oklahoma Governor Vetoes Anti-RFID Bill
Products and Releases  |  5/10/2010  | 
Legislation would have banned the technology from drivers' licenses, ID cards
Verizon Business, U.S. Secret Service to Join Forces On 2010 Data Breach Investigations Report
Products and Releases  |  5/6/2010  | 
Expanded study to include computer crime cases investigated by the Secret Service
Red Condor Warns Of 'Adobe Security Update' Malware Campaign
Products and Releases  |  5/5/2010  | 
Email campaign uses sophisticated social engineering in attempt to fool recipients
Palo Alto Addresses Facebook Privacy Concerns
Products and Releases  |  5/5/2010  | 
App-ID enables enterprises to control Facebook Social Plug-ins
SoundBite Communications Introduces Real-Time, Interactive Fraud Management Solution For Card Issuing Banks
Products and Releases  |  5/5/2010  | 
Fraud Management Solution enables card issuing banks to alert consumers in real-time via multichannels of possible credit card fraud
FireID Debuts Out-Of-Band Transaction Verification Application
Products and Releases  |  5/4/2010  | 
FireID Transaction Verification ensures only legitimate online transactions and payments are made
Infoblox Acquires Netcordia
Products and Releases  |  5/4/2010  | 
Acquisition, with undisclosed financial terms, includes complete assumption of Netcordia employees, assets and products
ValidEdge Rolls Out Fast Malware Analysis Appliance
Products and Releases  |  5/4/2010  | 
ValidEdge MIS 1100 incorporates several analysis engines for classification, decryption, unpacking, reverse engineering, and combined dynamic and static analysis
Comodo Offers One Year Virus-Free Guarantee
Products and Releases  |  5/4/2010  | 
Comodo Internet Security Complete Version 4.0 now available
M86 Security Labs Report Details Web Exploit Kits
Products and Releases  |  5/4/2010  | 
"Web Exploits - There's an App for That" details the rise of distributed, monetized "exploit" kits
NetWitness And ArcSight Partner
Products and Releases  |  5/4/2010  | 
NetWitness announces certification by ArcSight in compliance with its Common Event Format (CEF) standard
Q1 Labs Rolls Out High-Availability SIEM, Monitoring Product
Products and Releases  |  5/4/2010  | 
QRadar High Availability combines SIEM, risk management, log management and network behavior anomaly detection into one platform
2010 FIFA World Cup Card Fraud Warning
Products and Releases  |  5/4/2010  | 
Retail Decisions advises fans to follow six simple suggestions
HBGary Unveils Active Defense For Detecting Unknown Malware, Exploit Tools
Products and Releases  |  5/4/2010  | 
Active Defense can scan thousands of end-nodes concurrently and provide critical threat intelligence
World Bank, Gemalto Team Up To Bring Digital Security To Developing Countries
Products and Releases  |  5/4/2010  | 
eTransform Initiative supports social and economic advancement in developing countries
AT&T Launches Token-Based Mobile Authentication Service
Products and Releases  |  5/4/2010  | 
Adds soft token authentication support to AT&T Token Authentication Service
Trustifier Rolls Out Web Security Tool
Products and Releases  |  5/3/2010  | 
ry Trustifier comprises drop-in plug-ins and modules for Web servers, database servers
Fortinet: Botnets Battle For Digital Real Estate
Products and Releases  |  5/3/2010  | 
Gumblar and Sasfis continue to gain momentum
PCI Standards Council Launches Internal Security Assessor Program
Products and Releases  |  5/3/2010  | 
New training and certification program to help companies build internal PCI expertise
<<   <   Page 2 / 2

7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
PUBLISHED: 2021-05-14
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
PUBLISHED: 2021-05-14
A Zip Slip vulnerability was found in the oc binary in openshift-clients where an arbitrary file write is achieved by using a specially crafted raw container image (.tar file) which contains symbolic links. The vulnerability is limited to the command `oc image extract`. If a symbolic link is first c...