Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2009
<<   <   Page 3 / 3
Sourcefire Hires Managing Director Of Asia Pacific Operations
Products and Releases  |  6/8/2009  | 
Snort creator appoints Ammar Hindi to oversee business development
Evidence Talks Unveils Digital Forensic Triage Tool
Products and Releases  |  6/8/2009  | 
SPEKTOR Forensic Intelligence enables officers to make informed decisions while ensuring evidential continuity, along with forensic and legal acceptability
Richtek Taps RSA To Safeguard Intellectual Property
Products and Releases  |  6/8/2009  | 
RSA SecurID Appliance to provide two-factor authentication for secure access to analog IC design company's networked assets
BitDefender Report: Scammers Posing As Online Payment Services A Top Threat
Products and Releases  |  6/8/2009  | 
BitDefender's latest E-Threats Landscape Report provides an overview of the security threats landscape during the past six months and takes a look at what lies ahead in 2009
Sipera: VoIP Toll Fraud On The Rise
Products and Releases  |  6/8/2009  | 
Vulnerabilities affect both enterprises and service providers, and they stem from widespread gaps in insufficient VoIP and UC security architectures, company says
McAfee Offers Total Protection Bundle For Internet Gateways
Products and Releases  |  6/8/2009  | 
ToPS for Internet Gateway delivers Web, mail, and DLP at one price point
McAfee Unveils Next-Gen Enterprise Firewalls
Products and Releases  |  6/8/2009  | 
McAfee Firewall Enterprise (formerly Sidewinder), McAfee Firewall Enterprise Control Center, and McAfee Firewall Enterprise Profiler feature streamlined management through integration with McAfee ePolicy Orchestrator (ePO) software
NSA Certifies Sectera Edge Smartphone Release 2.0
Products and Releases  |  6/8/2009  | 
Release 2.0 improves overall performance and functionality of Sectera Edge devices, developed under the NSA Secure Mobile Environment/Portable Electronic Device (SME PED) program
McAfee Delivers Network Security Strategy
Products and Releases  |  6/8/2009  | 
Strategy integrates McAfee's network security suite, including network firewalls, intrusion prevention systems, Web and e-mail gateway security, and network data loss prevention, with McAfee ePolicy Orchestrator
EntrustBoard Reaffirms Recommendation That Stockholders Vote For Merger With HAC Holdings
Products and Releases  |  6/5/2009  | 
None of the three nonbinding indications of interest delivered during the "go-shop" period under its existing merger agreement resulted in a "superior proposal," according to Entrust
FTC Shuts Down ISP Notorious For Hosting Spammers, Botnets, Phishing, Porn
Products and Releases  |  6/4/2009  | 
FTC alleges that the defendant advertised its services in the darkest corners of the Internet, including a forum established to facilitate communication between criminals
ICANN To Work With NTIA, NIST, Verisign On Interim Solution To Core Internet Security Issue
Products and Releases  |  6/4/2009  | 
Organizations working on the goal of an operationally Signed Root Zone as soon as feasible in 2009
SonicWALL Rolls Out New Managed Service Provider Offering
Products and Releases  |  6/4/2009  | 
Next Generation Managed Service Provider (MSP) program aimed at partner community
Trend Micro Updates Free HouseCall Scanning Service
Products and Releases  |  6/4/2009  | 
HouseCall 7.0 includes a new user interface and streamlined processes resulting in shorter scan times
Webcast: Best Practices For Hospitals Moving To Electronic Medical Records
Products and Releases  |  6/4/2009  | 
Iron Mountain and Exempla Healthcare to discuss the chief components and benefits of an effective EMR transition plan
Deep Software Releases SoftActivity TS Monitor
Products and Releases  |  6/4/2009  | 
Solution enables administrators to monitor user activity in Windows Terminal Server sessions
Safe Internet Alliance Commends Administration's New Cybersecurity Effort
Products and Releases  |  6/4/2009  | 
Program's initiatives will better enable public and private partnerships to, as President Obama said, "find technology solutions that ensure our security and promote prosperity."
Liberty Alliance Announces SAML 2.0 Interoperability Testing Dates
Products and Releases  |  6/4/2009  | 
Program streamlines testing procedures to encourage wide scale vendor participation
VeriSign Partners With Web.com Marketer For SMBs
Products and Releases  |  6/4/2009  | 
By displaying the VeriSign Secured Seal, businesses show visitors their site is secured using industry-leading SSL technology
Survey: Hiring Managers Struggling To Fill Positions Despite Downturn
Products and Releases  |  6/4/2009  | 
Areas of expertise most sought after include operations security, information risk management, and access control systems and methodology, according to (ISC)2 survey
PandaLabs Security Alert: Cybercriminals Exploiting Twitter
Products and Releases  |  6/3/2009  | 
Criminals have created accounts in Twitter and published thousands of comments in them under the topic "PhishTube Broadcast" to push them into the ranking of most popular topics
Verizon Business Unveils Cloud-Based Security Service
Products and Releases  |  6/3/2009  | 
'Computing as a Service' enables midmarket and larger companies to use a Web-based portal to employ computing resources in the quantities and duration dictated by their business needs
Red Condor Rolls Out BotHunter Email Security System
Products and Releases  |  6/3/2009  | 
BotHunter pulls targeted data, searching for potential bot activity across the Web
Sophos Releases Data Protection Solution For The Midmarket
Products and Releases  |  6/3/2009  | 
Offerings add encryption and device control to the endpoint and gateway
Twitter Scareware Attack Signals New Trend In Social Net Security
Products and Releases  |  6/3/2009  | 
Firms need to think hard before allowing staff access to advanced social networking applications, according to Finjan
Symantec To Webcast 2009 Financial Analyst Day
Products and Releases  |  6/3/2009  | 
Executive presentations will provide an overview of the company's strategy, key business initiatives, and financial goals
Lancope Granted U.S. Patent For Flow-based Detection Of Network Intrusions
Products and Releases  |  6/2/2009  | 
StealthWatch System analysis tool uses a flow-based approach to detect intrusions in computer communication networks
Wurldtech Expands Capabilities Of Achilles Network Testing Platform
Products and Releases  |  6/2/2009  | 
Adds test suites for emerging industrial wireless protocols; company also expands Achilles certification program
IDC VP Presents Keynote On Mainframe Security
Products and Releases  |  6/1/2009  | 
At Vanguard Security Conference, Christian Christiansen discusses how new threats are colliding with mainframe security, and the latest strategies and solutions for addressing mainframe security challenges
Raytheon, University of Texas Partner On Cybersecurity Solutions
Products and Releases  |  6/1/2009  | 
Raytheon will provide funding during the next 10 years for UT at Austin's Center for Information Assurance and Security faculty, working on computer security and information assurance projects
BSI Acquires First Advantage's Supply Chain Security Division
Products and Releases  |  6/1/2009  | 
Buy includes First Advantage's Supplier Compliance Manager Web tool and Quantitative Risk Solutions loss prevention assessment program
BitDefender Enhances On-Demand Scanner
Products and Releases  |  6/1/2009  | 
BitDefender Online Scanner shows users the security status of their PCs and detects and disinfects viruses and spyware files
Check Point Ships IP Appliances Integrated With Security Software Blades
Products and Releases  |  6/1/2009  | 
Check Point R70 IP appliance line includes intrusion prevention software blade
LANCO Group Selects Zscaler's Cloud-Delivered Security
Products and Releases  |  6/1/2009  | 
Multinational company reduces cost and improves Web 2.0 security with SaaS
Entrust Announces Expiration Of Hart-Scott-Rodino Waiting Period
Products and Releases  |  6/1/2009  | 
Merger with HAC Holdings will move ahead
<<   <   Page 3 / 3

FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...