Products and Releases

Content posted in June 2011
Page 1 / 2   >   >>
Savant Protection Unveils 'Enforcer' Application Whitelisting Product
Products and Releases  |  6/30/2011  | 
Savant Enforcer enforces application policies
Facebook Users Still Putting Their Friends At Risk
Products and Releases  |  6/30/2011  | 
In comparison, only 0.7% of Safego users spread malicious content to their friends
FFIEC Announces Guidance On Internet Banking Authentication
Products and Releases  |  6/30/2011  | 
Supplement stresses the need for performing risk assessments
U.S. Dept of Justice: Romanian Man Sentenced To Two Years In Prison For Online Auction Fraud Scheme
Products and Releases  |  6/30/2011  | 
According to court documents, Adrian Ghighina acted as a “money mule”
Lockheed Martin Launches Cyber Security Solution Tailored To Utility And Energy Industry
Products and Releases  |  6/30/2011  | 
New solution is tailored to the complex threat environment facing the energy industry
BSA Statement On Privacy, Data Security Bills
Products and Releases  |  6/29/2011  | 
Senate Commerce Committee hearing advances the debate on all fronts
45 Million People In U.S. Deliberately Manipulate Their Identities
Products and Releases  |  6/29/2011  | 
ID Analytics study found multiple patterns of deliberate identity manipulation
Russia Leapfrogs USA As World Leader For Malware
Products and Releases  |  6/29/2011  | 
Kaspersky Lab has released its monthly spam report for May 2011
Authentify Launches Special Promo Of 2CHK, New Online Banking Security App
Products and Releases  |  6/29/2011  | 
2CHK is a multichannel, multifactor authentication application
Avira Adds WebGuard Protection To Free Antivirus Software During Service Pack 2
Products and Releases  |  6/28/2011  | 
WebGuard component acts as a proxy to prevent customers from downloading malicious code
Cellcrypt Launches Encrypted Voice Calling For iPhone
Products and Releases  |  6/28/2011  | 
Cellcrypt Mobile provides voice call encryption
Security Advice For The Summer Vacation
Products and Releases  |  6/28/2011  | 
Kids are likely to spend more time on the Internet than they normally do and thus become an easy prey for cybercriminals
SonicWALL Integrates WAN Acceleration With SonicOS 5.8.1, Combines Firewall, WXA
Products and Releases  |  6/28/2011  | 
SonicOS 5.8.1 bolsters SonicWALL's consolidated security platform
SecurID's Inventor Offers New Electronic Wallet Tech To Third Parties
Products and Releases  |  6/28/2011  | 
USR electronic wallet authenticates identity with three factors quickly
Approva And MEGA Partner On GRC
Products and Releases  |  6/28/2011  | 
Interoperability enables end-to-end controls management process
ID Watchdog Announces Agreement With LastPass
Products and Releases  |  6/28/2011  | 
ID Watchdog and LastPass will be working together to integrate their products
Arbor Networks Ups IPv6 Security, New Peakflow Enhancements
Products and Releases  |  6/27/2011  | 
Announces availability of version 5.6 of Arbor Peakflow SP
Wedge Networks BeSecure Stops Web 2.0 And Social Media-Borne Malware Attacks
Products and Releases  |  6/27/2011  | 
BeSecure Web security appliance scans and secures sensitive information coming in and out of Web 2.0 and social media networks
Certivox Rolls Out Secure Information Exchange For The Cloud
Products and Releases  |  6/27/2011  | 
PrivateSky secures Web-based messaging, including Google Mail, Hotmail, Facebook
Lijit Networks Takes Proactive Measures To Protect Publishers From Internet Threats
Products and Releases  |  6/27/2011  | 
Dasient's Anti-Malvertising Solution provides extra layer of protection to ensure ad delivery is safe
AdaptiveMobile Acquires Sentry Wireless
Products and Releases  |  6/27/2011  | 
Sentry’s technology will be integrated into AdaptiveMobile’s Network Protection Platform
SPYRUS Releases Secure Pocket Drive For Secure Cloud Computing
Products and Releases  |  6/27/2011  | 
Secure Pocket Drive Remote Access Edition can be booted on almost any Windows compatible PC
Zenprise Launches Industry’s First Cloud-Based Mobile Enterprise Security And Device Management Solution
Products and Releases  |  6/27/2011  | 
Delivers advanced, end-to-end mobile security in the private cloud
MANDIANT Closes Strategic Investment Round With One Equity Partners, Kleiner Perkins Caufield Byers
Products and Releases  |  6/27/2011  | 
On May 16, the company launched MANDIANT Intelligent Response (MIR) v2.0
CloudPassage Delivers Elastic Cloud Server Security Within The Rackspace Cloud
Products and Releases  |  6/24/2011  | 
Rackspace cloud customers will have access to the CloudPassage software-as-a-service security solution
Dataguise Announces Enterprise Security Intelligence For Data Privacy
Products and Releases  |  6/24/2011  | 
Dataguise will introduce DgSuite 3.5 featuring DgDashboardT for actionable intelligence
Chinese Internet Users To Be Protected With Avira's Antivirus Engine
Products and Releases  |  6/24/2011  | 
Avira announces strategic partnership with Chinese Internet giant Tencent
Free Personal Online Protection From Hackers
Products and Releases  |  6/23/2011  | 
PrivateSky secure Web-based messaging, including Google Mail, Hotmail, and Facebook
WhiteHat Security Acquires Static Analysis Technology From Infrared Security
Products and Releases  |  6/22/2011  | 
Infrared Security’s management team will join WhiteHat Security
Lockheed Martin Cyber Security Alliance Study Finds Increase in Government Adoption of Cloud Computing, Despite Security Concerns
Products and Releases  |  6/22/2011  | 
IT decision-makers more familiar with cloud computing are more than twice as likely to trust it
AVG Q2 Threat Report Reveals Mobile App Monetization; Mac Malware
Products and Releases  |  6/22/2011  | 
Q2 Community-Powered Threat Report outlines new trends and threats
Aveksa Announces Version 5.0 Of Its Access Governance Automation Solution
Products and Releases  |  6/22/2011  | 
New product capabilities in Aveksa 5.0 include Data Access Governance for Windows File Shares and SharePoint
Comodo Offers Free SSL Analyzer
Products and Releases  |  6/22/2011  | 
SSL Analyzer highlights insecure elements that need immediate remediation in red
Imperva Files Registration Statement For Proposed Initial Public Offering
Products and Releases  |  6/21/2011  | 
Number of shares, price range have not yet been determined
Verizon Business Introduces New Risk Management Service
Products and Releases  |  6/21/2011  | 
Incident Analytics Service (IAS) enables customers to describe, track, analyze, and benchmark data breach incident metrics via a Web application
Trustwave Introduces File Integrity Monitoring In The Cloud
Products and Releases  |  6/21/2011  | 
FIM checks for additions, modifications, or deletions of sensitive files or other stored data
Panda Security Launches Panda Cloud Antivirus 1.5
Products and Releases  |  6/20/2011  | 
New release includes performance improvements as well as new features suggested by the product’s user community
Dell SecureWorks Partners With Qualys To Deliver Saas-Based Vulnerability Management Services
Products and Releases  |  6/20/2011  | 
Dell SecureWorks will integrate, manage and re-sell the QualysGuard suite of security and compliance services
Gillibrand Secures Approval For Defense Department Study On Recruiting And Retaining Cyber Warriors
Products and Releases  |  6/17/2011  | 
Cyberspace Warriors Act of 2011 would direct the Secretary of Defense to contract an independent organization to study the Department’s cybersecurity personnel requirements
GFI Software Releases 2011 Parent-Teen Internet Safety Report
Products and Releases  |  6/17/2011  | 
Study examines online behavior of U.S. parents and their teenage children
WatchGuard Enhances Email Security Appliances
Products and Releases  |  6/17/2011  | 
Releases new software update to its extensible content security (XCS) family of Web and messaging security appliances
General Dynamics Delivers Sectra Edge Smartphones To U.S. Air Force
Products and Releases  |  6/17/2011  | 
Smartphones are part of a broader Air Force plan to integrate Secure Mobile Environment Portable Electronic Devices
CA Technologies Expands Token Exchange Offer
Products and Releases  |  6/17/2011  | 
Customers using any security hardware token can trade them for CA ArcotID secure software credentials
Barrier1 Introduces Barrier1 2.0 Virtualized Network Security Solution
Products and Releases  |  6/16/2011  | 
Barrier1 2.0 draws information from 723 different device types from more than 400 different manufacturers
Companies Set To Release First Google Apps Security Bundle Tomorrow
Products and Releases  |  6/16/2011  | 
Collection of products that enhance data security, backup, and IT administration for companies using Google Apps
ADP Discloses Breach; Damage May Be Limited To One Client
Products and Releases  |  6/15/2011  | 
Intrusion detected by ADP security team during routine system monitoring
Top Layer Changes Name To Corero Network Security; Introduces New DDoS Defense Product
Products and Releases  |  6/15/2011  | 
DDoS Defense System detects and blocks application-layer DDOS attacks
Lookout Introduces Safe Browsing Feature To Protect Mobile Phone Users From Malware
Products and Releases  |  6/15/2011  | 
Users will be able to safely surf the Web and click on links from SMS, Facebook, or email
Equifax Introduces Flexible Options For Multifactor Authentication
Products and Releases  |  6/14/2011  | 
Anakam Two Factor Authentication v5.0 builds on the existing NIST Level 3 compliant authentication vectors
Apple Approves New App And Increases Demand For LocatePC In Retail Stores
Products and Releases  |  6/14/2011  | 
LocatePC Mobile Tracker Lite is a free application in Apple's App store that allows you to track your iPhone and iPad for free
Page 1 / 2   >   >>

Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-02-19
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on ...
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...
PUBLISHED: 2019-02-18
An issue was discovered in WTCMS 1.0. It allows remote attackers to execute arbitrary PHP code by going to the "Setting -> Mailbox configuration -> Registration email template" screen, and uploading an image file, as demonstrated by a .php filename and the "Content-Type: image/g...