Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2012
Page 1 / 2   >   >>
Network Barometer Report 2012: Nearly Half of All Enterprise Networks Will be Obsolete Within Five Years
Products and Releases  |  6/29/2012  | 
Trends including BYOD, video and virtualization are shortening network life expectancy
Webroot and F5 Networks Join Forces to Enhance Application Security for Enterprise Customers Worldwide
Products and Releases  |  6/29/2012  | 
Integration of Webroot's IP Reputation Services to power F5's IP Intelligence offering
CSS Uncovers SCEP Vulnerability For Mobile Devices In The Enterprise
Products and Releases  |  6/29/2012  | 
Simple Certificate Enrollment Protocol (SCEP) does not strongly authenticate certificate requests
InfoExpress Enhances NAC Support For BYOD With Support For More Mobile Devices
Products and Releases  |  6/29/2012  | 
NAC vendor offers apps for Android, iOS, other mobile platforms
SecureState's Research & Innovation Team to Release Smart Meter Hacking Framework
Products and Releases  |  6/29/2012  | 
World's first open source framework allows individuals to test for vulnerabilities in Smart Meters
IID Reports 12 Percent of Fortune 500 Still Infected With DNSChanger Malware
Products and Releases  |  6/28/2012  | 
New infographic shows need for collective intelligence to stop malware from causing millions of dollars in damage annually
Radiant Logic Releases Federated Identity Service Based on Virtualization
Products and Releases  |  6/28/2012  | 
RadiantOne VDS 6 Creates a Virtual Identity Hub for SSO, Cloud, and Federation Initiatives
NQ Mobile Scientists Reveal Ground-Breaking New Malware Detection Method
Products and Releases  |  6/28/2012  | 
New RiskRanker system will proactively seek out and identify risky apps in the marketplace even before they are downloaded to mobile devices
Manhattan U.S. Attorney, FBI Assistant Director In Charge Announce 24 Arrests In Eight Countries As Part of International Cyber Crime Takedown
Products and Releases  |  6/26/2012  | 
Two-Year FBI Undercover 'Carding' Operation Protected Over 400,000 Potential Cyber Crime Victims and Prevented Over $205 Million in Losses
Howard A. Schmidt, Former White House Cybersecurity Coordinator, Joins Qualys Board of Directors
Products and Releases  |  6/26/2012  | 
Distinguished global authority on Internet security and critical infrastructure to bring public sector expertise and help expand industry collaboration
TrustPort Rolls Out New AV
Products and Releases  |  6/26/2012  | 
TrustPort launches new enhanced product versions for online security
Silicon Valley Law Group Prevails, Bank Settles Wire Transfer Fraud Litigation
Products and Releases  |  6/26/2012  | 
Cyber thieves breached security, depleted funds from bank customer’s account
Survey: Highly Sensitive Information Sent Via Email Lacks Critical Security Controls
Products and Releases  |  6/25/2012  | 
For 80% of respondents, the only thing standing between an attacker and this email communication is a username and password, according to PhoneFactor
DARPA Awards Invincea $21.4 Million Contract To Create Secure Android Smartphones And Tablets For U.S. Army
Products and Releases  |  6/25/2012  | 
Secure Android phones and tablets currently in field test in Afghanistan by U.S. Army brigade
Metaforic Extends Software Immune System To Protect Applications Running On Apple iOS Devices
Products and Releases  |  6/22/2012  | 
Metaforic empowers developers to create secure and tamper-proof applications
VASCO Announces DIGIPASS KEY 202 And CertiID Suite 3.4.3
Products and Releases  |  6/22/2012  | 
DIGIPASS CertiID provides digital signatures for user authentication and transaction security
Check Point Survey Reveals A Generation Gap In Computer Security
Products and Releases  |  6/22/2012  | 
More than three-quarters of Gen Y respondents do not follow security best practices
Redspin Pioneers Advanced Persistent Threat (APT) Assessment Service
Products and Releases  |  6/22/2012  | 
New service uses multiple attack vectors and shared knowledge assessments
Voltage Security Extends End-To-End Email Encryption To iOS And Android Devices
Products and Releases  |  6/22/2012  | 
Voltage SecureMail Mobile Edition allows mobile users to read encrypted messages sent from Voltage-enabled desktops, gateways, enterprise applications and other mobile devices
Wurldtech Provides Schneider Electric With Achilles Lab Accreditation
Products and Releases  |  6/22/2012  | 
Achilles Communication Certification provides security benchmark for embedded devices used in industrial infrastructure and other mission-critical connected devices
13 Security Tips To Combat Mobile Device Threats To Healthcare
Products and Releases  |  6/22/2012  | 
Risks to patient data growing, as cited by Department of Homeland Security
Dataguise And MapR Partner To Protect Big Data
Products and Releases  |  6/22/2012  | 
Dataguise will offer its DgHadoopT solution to protect sensitive data aggregated in Hadoop deployments
One In Five Financial Firms 'Don't Know' Whether They Have Suffered Data Breaches
Products and Releases  |  6/22/2012  | 
Study from PwC and Iron Mountain shows worrying level of complacency among Europe's financial services firms
AutoTrader.com Launches Privacy Shield Nationwide
Products and Releases  |  6/22/2012  | 
Privacy Shield helps private sellers keep their personal contact information private
nCircle Expands Vulnerability Scanning For SCADA Devices
Products and Releases  |  6/22/2012  | 
nCircle Suite360 now covers vulnerabilities from six more equipment suppliers
BlueCat Networks Partners With Thales To Deliver Ultra Secure DNS Security Extensions
Products and Releases  |  6/22/2012  | 
New BlueCat Networks appliance models integrate with Thales nShield HSM
The Global Cyber Warfare Market 2011-2021 - Competitive Landscape And Strategic Insights: Market Profile
Products and Releases  |  6/22/2012  | 
Report shows leading cyberwarfare market segments
Gemalto Launches Protiva Defender Suite, an End-To-End Identity And Access Solution For Law Enforcement Officials
Products and Releases  |  6/21/2012  | 
Provicta Defender Suite addresses increasing industry regulations mandating strong digital identity verification
MineralTree Raises $6.3 Million To Accelerate Growth
Products and Releases  |  6/21/2012  | 
Fidelity Growth Partners India leads financing round
Mocana Rolls Out Software, Services For Securing 'The Internet Of Things'
Products and Releases  |  6/21/2012  | 
Mocana Security DetailT comprises four comprehensive security suites
Latest Erasure Solutions Launch Preemptive Strike Against Data Breaches
Products and Releases  |  6/20/2012  | 
Blancco 5 data erasure software and centralized Management Console supports fast, simple and complete data removal from electronic devices
SafeNet And Pitney Bowes Collaborate On The First Cryptographically Secured Digital Mailbox In The Cloud
Products and Releases  |  6/20/2012  | 
By selecting SafeNet as its security technology partner, Volly's digital mailbox content can securely reside in the cloud
HP Rolls Out Mobile Security Products, Services For SMBs
Products and Releases  |  6/20/2012  | 
New offerings also include financing and training programs
Bluebox, New Mobile Security Startup, Receives Funding
Products and Releases  |  6/20/2012  | 
Round led by Andreessen Horowitz
LANDesk Acquires Wavelink To Redefine Mobility Management
Products and Releases  |  6/20/2012  | 
Acquisition is the second for LANDesk in 2012
Dave DeWalt Joins FireEye As Chairman Of The Board
Products and Releases  |  6/19/2012  | 
DeWalt is former president and chief executive officer of McAfee
StrikeForce Makes Multifactor Authentication And Keystroke Encryption Available To Cloud Vendors
Products and Releases  |  6/19/2012  | 
StrikeForce Technologies announces a solution designed to improve the security of private and public clouds
NT OBJECTives Releases New NTOEnterprise For Web Application Vulnerability Program Management
Products and Releases  |  6/19/2012  | 
NTOEnterprise 2.0 enables organizations to plan, manage, control, and measure thousands of Web application scans
Lumeta Announces Device Profiling Supporting BYOD Security Initiatives
Products and Releases  |  6/19/2012  | 
Latest release supports comprehensive profiling across more than 26,000 devices
Symantec Survey Reveals Online File Sharing Poses Great Security Risks To SMBs
Products and Releases  |  6/19/2012  | 
SMB employees are increasingly adopting unmanaged, personal-use online file sharing solutions without permission from IT
'Verizon 2012 Data Breach Investigations Report' Now Available As Free iBook
Products and Releases  |  6/18/2012  | 
Users can download DBIR on an iPad with iBooks 2 or on a computer with iTunes
Vormetric Prevents Big Data Toxic Leaks
Products and Releases  |  6/18/2012  | 
Vormetric Encryption secures structured and unstructured information stored in Big Data platforms
Sourcefire Expands Portfolio To Address Malware Targeting Mobile Devices
Products and Releases  |  6/18/2012  | 
FireSIGHT and FireAMP Mobile identify mobile devices connecting to a network
Kevin Mitnick Partners With KnowBe4
Products and Releases  |  6/18/2012  | 
Mitnick has taken the role of KnowBe4's Chief Hacking Officer
Black Hat Releases Complete Event Schedule
Products and Releases  |  6/14/2012  | 
Among the news breaking will be 36 tools, 17 0-days, and 49 live on-stage demonstrations
BT Simplifies Big Data And Security Challenges With New Visualization Service
Products and Releases  |  6/14/2012  | 
BT Assure Analytics helps organizations to collect, arrange, and evaluate big data sets
American Bar Association Endorses Chubb's Cyber Liability Insurance Product
Products and Releases  |  6/14/2012  | 
Covers losses that typically are not covered by a lawyer's professional liability policy
CloudPassage Introduces Halo GhostPorts SMS
Products and Releases  |  6/13/2012  | 
Secure saccess control for any application on any server in any cloud using any mobile phone as the authentication device
CloudLock Unveils The Industry's First PII And PCI Compliance Scan For Google Drive
Products and Releases  |  6/12/2012  | 
Ability to find, classify, and protect extremely sensitive PII data was a top CloudLock feature request
Panda Security Launches Panda Cloud Office Protection Advanced
Products and Releases  |  6/12/2012  | 
Anti-spam protection stops unwanted email and manages corporate email effectively
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file