Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2010
Page 1 / 3   >   >>
New Data Erasure Software For Smartphones Arrive
Products and Releases  |  6/30/2010  | 
Blancco Mobile Edition designed to eliminate risk of inadvertent data leaks by erasing retired smartphones
Rapid7 Ranks First In Pen Testing Face-Off
Products and Releases  |  6/30/2010  | 
Metasploit Express places first in the HackMiami 2010 penetration testing competition
DocuSign Adds Two-Factor Biometrics To E-Signature Service
Products and Releases  |  6/30/2010  | 
Integrates Authentify's automated phone call and voice capture authentication process into electronic document signature service
Sasfis Botnet Active This Month, Report Show
Products and Releases  |  6/30/2010  | 
Fortinet publishes June 2010 Threat Landscape
New Spam Campaigns Use JavaScript
Products and Releases  |  6/30/2010  | 
eleven: Opening the attachment redirects browser to spam or phishing Websites
AirMagnet Launches AirWISE Community
Products and Releases  |  6/30/2010  | 
Online resource center designed to foster education, collaboration and contribution around WLAN security and reliability topics
Cloud Leverage Unveils Cloud IPS/Firewall
Products and Releases  |  6/30/2010  | 
Cloud/IPS Firewall includes integrated geo-location analysis capabilities
Chem Industry Commends Senate On Critical Cyberspace Security Action
Products and Releases  |  6/30/2010  | 
Homeland Security Committee approves legislation designed to protect nation's cyberinfrastructure
Entrust Expands Strong Authentication Platform
Products and Releases  |  6/30/2010  | 
IdentityGuard now compatible with Microsoft Windows Vista, Microsoft Windows 7 and Microsoft Windows Server 2008
Verizon Business Offers Tips On How Enterprises Can Secure The Cloud
Products and Releases  |  6/30/2010  | 
Concerns about security are often cited as the No. 1 barrier to widespread adoption of cloud solutions
New Line Of Stylish Secure Wallets Prevent Wireless 'Pickpocketing'
Products and Releases  |  6/30/2010  | 
DataSafe wallets designed to fight credit card and identity theft
80% Say Network Threats Will Increase In 2010 And 2011 While Budgets Drop
Products and Releases  |  6/29/2010  | 
netForensics study results conclude the need for increased budgeting and resources for network security
40 Percent Of Organizations Planning To Deploy Mobile Phone Data Encryption
Products and Releases  |  6/29/2010  | 
Survey also shows important challenges ahead for resourcing
BlockMaster Security Teams With Kingston Digital In Secure USBs
Products and Releases  |  6/29/2010  | 
Partnership to expand the range of secure managed devices
How To Know If Your IT Outsourcing Partner Is Right For Your Organization
Products and Releases  |  6/29/2010  | 
Key 'insider secrets' that you can use as a benchmark
Sentrigo Adds DB2, MySQL Support To Vuln Assessment And Security Scanner
Products and Releases  |  6/29/2010  | 
Version 3.5 extends vulnerability scanning to additional database environments
Riverbed Partners With Microsoft For Secure Web Gateway Solution
Products and Releases  |  6/29/2010  | 
Solution combines Riverbed WAN optimization technology with Microsoft's Forefront Threat Management Gateway 2010
Symantec Tool Challenges Small Businesses To Assess Their Exposure To Information Risk
Products and Releases  |  6/29/2010  | 
Symantec Small Business Check-up helps companies compare their security, data protection and storage profiles to their peers
McAfee Unveils Next-Gen Web Protection From The Cloud
Products and Releases  |  6/29/2010  | 
McAfee SaaS Web Protection will address onslaught of Web 2.0 vulnerabilities
VeriSign DNSSEC Interop Lab Adds Brocade, A10 Networks, BlueCat Networks
Products and Releases  |  6/29/2010  | 
Meanwhile, VeriSign continues to work closely with ICANN and the Department of Commerce on root zone deployment
Crossbeam And Sophos Partner To Deliver High-Performance Email Security
Products and Releases  |  6/28/2010  | 
Sophos has joined Crossbeam’s list of security partners whose software is certified to run on the X-Series security platform
Blancco Secures Smartphones For Reuse Or Disposal With Data Erasure Software For Mobile Devices
Products and Releases  |  6/28/2010  | 
Blancco Mobile Edition eliminates business risk by erasing sensitive information
Teleperformance Launches Fraud Risk Assessment Solution
Products and Releases  |  6/28/2010  | 
Service to help identify and quantify the business impact of fraud risks within many phases of a call center agent's work
Comodo Update On VeriSign's Security Vulnerability
Products and Releases  |  6/28/2010  | 
VeriSign has publicly acknowledged fixes to its certificate management portal
Saxo Bank Adopts Full Anti-Money Laundering Suite From NICE Actimize
Products and Releases  |  6/25/2010  | 
AML platform will be fully integrated across Saxo Banks operations in multiple countries
Synovus Financial Reduces Identity Management Costs By 80% With Novell
Products and Releases  |  6/25/2010  | 
Commercial and retail banking organization streamlines access control and risk management
4 Less Communications, Inc. Launches Discount SSL Certificate Website; Certs4Less.com
Products and Releases  |  6/25/2010  | 
Newly launched company offers security products for websites and software development
NuBridges Extends Tokenization Technology
Products and Releases  |  6/24/2010  | 
Protect Token Manager adds support for new data security architecture; enables simultaneous tokenization by multiple data centers
OpenDNS Introduces FamilyShield Internet Content Filter For Home Users
Products and Releases  |  6/24/2010  | 
Protects all Internet-connected devices, including gaming consoles
Trustwave Unveils End-To-End Encryption Software Solution
Products and Releases  |  6/24/2010  | 
Solution includes automated electronic encryption key management system
iPads Susceptible To iPhone Malware, Researchers Say
Products and Releases  |  6/24/2010  | 
iPad proves susceptible to the iPhone/Eeki.A worm that infected jailbroken iPhones last year
WebNew Industry Study Benchmarks Total Cost Security Purchases
Products and Releases  |  6/24/2010  | 
TCA consists of three main drivers, according to study commissioned by Web filtering solutions provider St. Bernard Software
Security Fears Hamper 'Government 2.0' Shift, Study Says
Products and Releases  |  6/24/2010  | 
Concerns over data security are inhibiting government agencies from embracing Web 2.0 technologies
BluePay Responds To PCI Deadline With End-To-End Encryption
Products and Releases  |  6/24/2010  | 
Merchant account service provider offers solution with tight security and data encryption
Comodo Urges Verisign To Correct Major Security Vulnerability
Products and Releases  |  6/24/2010  | 
Comodo believes it is a significant security concern for VeriSign's customers
Trustwave Acquires Breach Security
Products and Releases  |  6/22/2010  | 
Deal creates a single-source WAF and application penetration testing solution
Payment Card And Data Security Leaders Predict Transformation in Merchant Card Data Management
Products and Releases  |  6/22/2010  | 
Emerging services and technologies reshape electronic payment landscape by shifting focus from risk protection to risk removal
Four Security Steps To Take Before You Go On Vacation This Summer
Products and Releases  |  6/22/2010  | 
Tips for a happy vacation without any worries
MEGA And Stamford Risk Analytics Establish Global Partnership For Risk Management, GRC
Products and Releases  |  6/22/2010  | 
Combined risk management toolset will provide a holistic approach to ERM and business process performance
F5 Announces FirePass 7.0
Products and Releases  |  6/22/2010  | 
FirePass version 7.0 provides enhanced access capabilities, stronger security
LogRhythm Delivers Log-Powered Security Visualization Platform
Products and Releases  |  6/22/2010  | 
LogRhythm uses log and security event data combined with geolocation and network activity relationship mapping
Identity Finder, LLC Announces Enterprise Suite 4.5
Products and Releases  |  6/22/2010  | 
Enterprise Suite 4.5 reduces the risk of data leakage by discovering and protecting sensitive information across an organization
Internet Security Book For Kids, Teens, Adults Available Now As Free Download
Products and Releases  |  6/22/2010  | 
Own Your Space boasts the "street cred" important to the book's target audience
M86 Security Extends Global Partnership With Kaspersky Lab
Products and Releases  |  6/22/2010  | 
M86 to offer Kaspersky Lab's anti-malware scanning capabilities
New Smart Card Research Available From IMS, Smart Card Alliance
Products and Releases  |  6/22/2010  | 
Report includes estimates of the smart card installed base for 2008 and 2009 with forecasts to 2014
Palo Alto Networks Introduces GlobalProtect for Remote Enterprise Security
Products and Releases  |  6/22/2010  | 
Private cloud-based approach extends next-generation firewall visibility and control to remote endpoints
Tripwire Unveils Nine Best Practices To Achieve Compliance And Mitigate Security Risk
Products and Releases  |  6/22/2010  | 
Steps focus on best practices for avoiding audit fatigue
Nasuni Demonstrates Cloud Storage Security With Bold Challenge
Products and Releases  |  6/22/2010  | 
Reveal the contents of the file stored in the cloud by a Nasuni Filer, and win $5,000
RSA, The Security Division of EMC, and Lumension Team Up To Help Businesses Better Secure Sensitive Data
Products and Releases  |  6/22/2010  | 
By building DLP technology into the infrastructure, RSA and Lumension plan to be able to offer customers a complete data protection solution
Bit9 Launches Parity 6.0 Application Whitelisting Solution
Products and Releases  |  6/22/2010  | 
New features include file integrity monitoring and registry protection
Page 1 / 3   >   >>

7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.