Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2010
Page 1 / 3   >   >>
New Data Erasure Software For Smartphones Arrive
Products and Releases  |  6/30/2010  | 
Blancco Mobile Edition designed to eliminate risk of inadvertent data leaks by erasing retired smartphones
Rapid7 Ranks First In Pen Testing Face-Off
Products and Releases  |  6/30/2010  | 
Metasploit Express places first in the HackMiami 2010 penetration testing competition
DocuSign Adds Two-Factor Biometrics To E-Signature Service
Products and Releases  |  6/30/2010  | 
Integrates Authentify's automated phone call and voice capture authentication process into electronic document signature service
Sasfis Botnet Active This Month, Report Show
Products and Releases  |  6/30/2010  | 
Fortinet publishes June 2010 Threat Landscape
New Spam Campaigns Use JavaScript
Products and Releases  |  6/30/2010  | 
eleven: Opening the attachment redirects browser to spam or phishing Websites
AirMagnet Launches AirWISE Community
Products and Releases  |  6/30/2010  | 
Online resource center designed to foster education, collaboration and contribution around WLAN security and reliability topics
Cloud Leverage Unveils Cloud IPS/Firewall
Products and Releases  |  6/30/2010  | 
Cloud/IPS Firewall includes integrated geo-location analysis capabilities
Chem Industry Commends Senate On Critical Cyberspace Security Action
Products and Releases  |  6/30/2010  | 
Homeland Security Committee approves legislation designed to protect nation's cyberinfrastructure
Entrust Expands Strong Authentication Platform
Products and Releases  |  6/30/2010  | 
IdentityGuard now compatible with Microsoft Windows Vista, Microsoft Windows 7 and Microsoft Windows Server 2008
Verizon Business Offers Tips On How Enterprises Can Secure The Cloud
Products and Releases  |  6/30/2010  | 
Concerns about security are often cited as the No. 1 barrier to widespread adoption of cloud solutions
New Line Of Stylish Secure Wallets Prevent Wireless 'Pickpocketing'
Products and Releases  |  6/30/2010  | 
DataSafe wallets designed to fight credit card and identity theft
80% Say Network Threats Will Increase In 2010 And 2011 While Budgets Drop
Products and Releases  |  6/29/2010  | 
netForensics study results conclude the need for increased budgeting and resources for network security
40 Percent Of Organizations Planning To Deploy Mobile Phone Data Encryption
Products and Releases  |  6/29/2010  | 
Survey also shows important challenges ahead for resourcing
BlockMaster Security Teams With Kingston Digital In Secure USBs
Products and Releases  |  6/29/2010  | 
Partnership to expand the range of secure managed devices
How To Know If Your IT Outsourcing Partner Is Right For Your Organization
Products and Releases  |  6/29/2010  | 
Key 'insider secrets' that you can use as a benchmark
Sentrigo Adds DB2, MySQL Support To Vuln Assessment And Security Scanner
Products and Releases  |  6/29/2010  | 
Version 3.5 extends vulnerability scanning to additional database environments
Riverbed Partners With Microsoft For Secure Web Gateway Solution
Products and Releases  |  6/29/2010  | 
Solution combines Riverbed WAN optimization technology with Microsoft's Forefront Threat Management Gateway 2010
Symantec Tool Challenges Small Businesses To Assess Their Exposure To Information Risk
Products and Releases  |  6/29/2010  | 
Symantec Small Business Check-up helps companies compare their security, data protection and storage profiles to their peers
McAfee Unveils Next-Gen Web Protection From The Cloud
Products and Releases  |  6/29/2010  | 
McAfee SaaS Web Protection will address onslaught of Web 2.0 vulnerabilities
VeriSign DNSSEC Interop Lab Adds Brocade, A10 Networks, BlueCat Networks
Products and Releases  |  6/29/2010  | 
Meanwhile, VeriSign continues to work closely with ICANN and the Department of Commerce on root zone deployment
Crossbeam And Sophos Partner To Deliver High-Performance Email Security
Products and Releases  |  6/28/2010  | 
Sophos has joined Crossbeam’s list of security partners whose software is certified to run on the X-Series security platform
Blancco Secures Smartphones For Reuse Or Disposal With Data Erasure Software For Mobile Devices
Products and Releases  |  6/28/2010  | 
Blancco Mobile Edition eliminates business risk by erasing sensitive information
Teleperformance Launches Fraud Risk Assessment Solution
Products and Releases  |  6/28/2010  | 
Service to help identify and quantify the business impact of fraud risks within many phases of a call center agent's work
Comodo Update On VeriSign's Security Vulnerability
Products and Releases  |  6/28/2010  | 
VeriSign has publicly acknowledged fixes to its certificate management portal
Saxo Bank Adopts Full Anti-Money Laundering Suite From NICE Actimize
Products and Releases  |  6/25/2010  | 
AML platform will be fully integrated across Saxo Banks operations in multiple countries
Synovus Financial Reduces Identity Management Costs By 80% With Novell
Products and Releases  |  6/25/2010  | 
Commercial and retail banking organization streamlines access control and risk management
4 Less Communications, Inc. Launches Discount SSL Certificate Website; Certs4Less.com
Products and Releases  |  6/25/2010  | 
Newly launched company offers security products for websites and software development
NuBridges Extends Tokenization Technology
Products and Releases  |  6/24/2010  | 
Protect Token Manager adds support for new data security architecture; enables simultaneous tokenization by multiple data centers
OpenDNS Introduces FamilyShield Internet Content Filter For Home Users
Products and Releases  |  6/24/2010  | 
Protects all Internet-connected devices, including gaming consoles
Trustwave Unveils End-To-End Encryption Software Solution
Products and Releases  |  6/24/2010  | 
Solution includes automated electronic encryption key management system
iPads Susceptible To iPhone Malware, Researchers Say
Products and Releases  |  6/24/2010  | 
iPad proves susceptible to the iPhone/Eeki.A worm that infected jailbroken iPhones last year
WebNew Industry Study Benchmarks Total Cost Security Purchases
Products and Releases  |  6/24/2010  | 
TCA consists of three main drivers, according to study commissioned by Web filtering solutions provider St. Bernard Software
Security Fears Hamper 'Government 2.0' Shift, Study Says
Products and Releases  |  6/24/2010  | 
Concerns over data security are inhibiting government agencies from embracing Web 2.0 technologies
BluePay Responds To PCI Deadline With End-To-End Encryption
Products and Releases  |  6/24/2010  | 
Merchant account service provider offers solution with tight security and data encryption
Comodo Urges Verisign To Correct Major Security Vulnerability
Products and Releases  |  6/24/2010  | 
Comodo believes it is a significant security concern for VeriSign's customers
Trustwave Acquires Breach Security
Products and Releases  |  6/22/2010  | 
Deal creates a single-source WAF and application penetration testing solution
Payment Card And Data Security Leaders Predict Transformation in Merchant Card Data Management
Products and Releases  |  6/22/2010  | 
Emerging services and technologies reshape electronic payment landscape by shifting focus from risk protection to risk removal
Four Security Steps To Take Before You Go On Vacation This Summer
Products and Releases  |  6/22/2010  | 
Tips for a happy vacation without any worries
MEGA And Stamford Risk Analytics Establish Global Partnership For Risk Management, GRC
Products and Releases  |  6/22/2010  | 
Combined risk management toolset will provide a holistic approach to ERM and business process performance
F5 Announces FirePass 7.0
Products and Releases  |  6/22/2010  | 
FirePass version 7.0 provides enhanced access capabilities, stronger security
LogRhythm Delivers Log-Powered Security Visualization Platform
Products and Releases  |  6/22/2010  | 
LogRhythm uses log and security event data combined with geolocation and network activity relationship mapping
Identity Finder, LLC Announces Enterprise Suite 4.5
Products and Releases  |  6/22/2010  | 
Enterprise Suite 4.5 reduces the risk of data leakage by discovering and protecting sensitive information across an organization
Internet Security Book For Kids, Teens, Adults Available Now As Free Download
Products and Releases  |  6/22/2010  | 
Own Your Space boasts the "street cred" important to the book's target audience
M86 Security Extends Global Partnership With Kaspersky Lab
Products and Releases  |  6/22/2010  | 
M86 to offer Kaspersky Lab's anti-malware scanning capabilities
New Smart Card Research Available From IMS, Smart Card Alliance
Products and Releases  |  6/22/2010  | 
Report includes estimates of the smart card installed base for 2008 and 2009 with forecasts to 2014
Palo Alto Networks Introduces GlobalProtect for Remote Enterprise Security
Products and Releases  |  6/22/2010  | 
Private cloud-based approach extends next-generation firewall visibility and control to remote endpoints
Tripwire Unveils Nine Best Practices To Achieve Compliance And Mitigate Security Risk
Products and Releases  |  6/22/2010  | 
Steps focus on best practices for avoiding audit fatigue
Nasuni Demonstrates Cloud Storage Security With Bold Challenge
Products and Releases  |  6/22/2010  | 
Reveal the contents of the file stored in the cloud by a Nasuni Filer, and win $5,000
RSA, The Security Division of EMC, and Lumension Team Up To Help Businesses Better Secure Sensitive Data
Products and Releases  |  6/22/2010  | 
By building DLP technology into the infrastructure, RSA and Lumension plan to be able to offer customers a complete data protection solution
Bit9 Launches Parity 6.0 Application Whitelisting Solution
Products and Releases  |  6/22/2010  | 
New features include file integrity monitoring and registry protection
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file