Products and Releases

Content posted in July 2012
Page 1 / 3   >   >>
SSH Communications Security Launches Industry-First DLP Auditing Solution
Products and Releases  |  7/31/2012  | 
CryptoAuditor helps prevent data loss across encrypted secure shell, RDP, and SFTP traffic
NCP Releases Universal IPsec Clients For Android
Products and Releases  |  7/31/2012  | 
NCP Secure Android Client and Premium Android Client ensure secure access to corporate networks from all Android applications
BeyondTrust Launches PowerBroker Mobile
Products and Releases  |  7/31/2012  | 
New offering integrates context-aware management with vulnerability and patch information
Trend Micro Comments On Senate Cybersecurity Act
Products and Releases  |  7/31/2012  | 
Announced support for the legislation
Akamai Reports Second Quarter 2012 Financial Results
Products and Releases  |  7/31/2012  | 
Revenue for the second quarter of 2012 was $331 million
Websense Security Labs Launches New Intelligence Services And Tools
Products and Releases  |  7/31/2012  | 
Websense CSI On-Demand and Live services help organizations pinpoint attack methods, processes, and data targets
Centrify Announces Support For Apple Mac OS X Mountain Lion With Active Directory-Based Security And Management
Products and Releases  |  7/31/2012  | 
DirectControl for Mac enables admins to use Active Directory and Windows Group Policy to centrally control Mac systems in the workplace
AVG Updates Mobilation AntiVirus For Android
Products and Releases  |  7/30/2012  | 
Update features a new push notification that will alert users as they approach their monthly data limit
ReaSoft Network Firewall 3: Corporate Firewall With DLP Elements
Products and Releases  |  7/30/2012  | 
ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, Webmail, ICQ, MSN, Internet communities, and other similar channels
Sophos Offers Free Antivirus App For Android Users
Products and Releases  |  7/30/2012  | 
Sophos Mobile Security automatically scans apps as users install them
Black Hat Survey: 36% Of Information Security Professionals Have Engaged In Retaliatory Hacking
Products and Releases  |  7/26/2012  | 
Some IS pros believe retaliatory attacks may discourage further attacks, according to nCircle
FireHost Selects Radware's Attack Mitigation System For Real-Time Network Attack Prevention
Products and Releases  |  7/25/2012  | 
FireHostwill use Radware's AMS as a key IT security solution across its network of secure cloud servers
Micro​soft/Trust​wave Expand ModSecurit​y To IIS And Nginx Servers
Products and Releases  |  7/25/2012  | 
ModSecurity is a free, open source Web application firewall
AccessData Releases Cyber Intelligence & Response Technology (CIRT) Version 2
Products and Releases  |  7/25/2012  | 
CIRT integrates network and computer forensics, malware analysis, large-scale data, auditing, and remediation
Appthority Unveils Hidden Security Risks Of Top Mobile Apps
Products and Releases  |  7/25/2012  | 
Report examines the security risks of the top 50 free iOS and Android apps
New RSA Service Helps Customers Detect And Shut Down Rogue Mobile Apps
Products and Releases  |  7/25/2012  | 
RSA FraudAction Anti Rogue App Service helps organizations discover fraudulent mobile apps that are leveraging customer brands to infect end users or steal credentials
Trend Micro Releases Security Roundup Report For Q2 2012
Products and Releases  |  7/25/2012  | 
Increasingly targeted and personalized attacks led to more than 140 million attacks that were blocked by Trend Micro against small businesses in the first half of the year
Symantec Names New President And CEO
Products and Releases  |  7/25/2012  | 
Steve Bennett, chairman of Symantec board, named president and chief executive officer; Dan Schulman appointed lead independent director
Radware's Attack Mitigation Black Belt Challenge Reveals IT Professionals' Strengths And Weaknesses Of Top Security Threats
Products and Releases  |  7/25/2012  | 
Pinpoints leading areas of knowledge that IT managers need to improve upon to enhance their attack mitigation proficiency
New Websense CyberSecurity Intelligence Services Provide Sandboxing, Forensics And Proactive Training To Combat Threats
Products and Releases  |  7/25/2012  | 
Websense CSI On-Demand and Live services help organizations pinpoint attack methods, processes, and data targets
Microsoft Security Toolkit Delivers New BlueHat Prize Defensive Technology
Products and Releases  |  7/25/2012  | 
EMET 3.5 makes it more difficult for attackers to exploit vulnerabilities and gain system access
SSH Communications Security Launches CryptoAuditor: Minimally-Invasive Enterprise Privileged User Access Auditing Solution
Products and Releases  |  7/25/2012  | 
Helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with inline, real-time and transparent audit capabilities
GFI Survey Finds 12% of Consumers Would Use Mobile Location-Based Tracking To Keep Tabs On Their Spouses
Products and Releases  |  7/24/2012  | 
Location tracking also attractive to parents, with one in three saying they would use the feature to snoop on their teen’s whereabouts
HITRUST Expands Cybersecurity Center With Launch Of First Cyber Threat Analysis Service For Healthcare Industry
Products and Releases  |  7/24/2012  | 
Service is a new component of the recently announced HITRUST Cybersecurity Incident Response and Coordination Center
Analysis Of The Mobile Endpoint Security Products Market
Products and Releases  |  7/24/2012  | 
Report examines drivers and restraints for growth, pricing, distribution, and demand
VSS Monitoring Introduces New Network Packet Brokers To Enable Complete Networkwide Visibility And Performance
Products and Releases  |  7/24/2012  | 
vBroker appliances expand the capacity and interface flexibility of its packet broker solutions
GFI VIPRE Mobile Security Premium Now Available For Android Devices
Products and Releases  |  7/24/2012  | 
New app enables users to defend smartphones and tablets from viruses, monitor kids’ mobile activity, back up data, and remotely lock and wipe lost or stolen devices
Maxim's Security Manager Ensures Smart Grid Infrastructure Security
Products and Releases  |  7/24/2012  | 
MAX36025 adds secure encryption to critical points of data aggregation within the smart grid
Q2 2012 FireHost Web Application Attack Report Shows Sharp Rise In SQL Injections
Products and Releases  |  7/24/2012  | 
From April to June 2012, the Web applications, databases, and websites of FireHost’s customers were protected from a total of 17 million cyberattacks
Qualys Announces General Availability Of Its Dynamic Asset Tagging And Management Technology
Products and Releases  |  7/24/2012  | 
Technology enables customers to identify, categorize, and manage large numbers of assets in highly dynamic IT environments
HiSoftware And AIIM Survey Highlights Gaps In SharePoint Content Security
Products and Releases  |  7/24/2012  | 
The struggle between the open-nature of SharePoint and the need to secure sensitive data is clear in the reactions from respondents
WatchDox, Ponemon Institute Expose Enterprise Document Security Risks
Products and Releases  |  7/24/2012  | 
Study examines state of document-centric security in today’s corporate environment; identifies top risks
Context Presents 'Breaking .NET Through Serialization' At Black Hat USA
Products and Releases  |  7/24/2012  | 
Serialization vulnerabilities can lead to data disclosure or remote code execution, warns Context in white paper published today
GFI Software Launches GFI LanGuard 2012
Products and Releases  |  7/24/2012  | 
Solution includes combines vulnerability scanning, patch management, and network and software auditing
Novell Makes BYOD Enterprise Ready
Products and Releases  |  7/24/2012  | 
ZENworks Mobile Management automates the process of enrolling new devices
Avecto Reports Significant Growth Since Launch, Expands North America Presence
Products and Releases  |  7/23/2012  | 
Avecto closed out the year having significantly expanded operations in North America and Europe
Emulex OneConnect Network Xceleration Solution Provides Increased Performance With New Release Of Suricata
Products and Releases  |  7/23/2012  | 
FastStack Sniffer 10G provides greater vulnerability protection with lower packet drop rates
Microsoft Dynamics CRM Online Launches Trust Center
Products and Releases  |  7/23/2012  | 
Web site provides in-depth information about privacy and security practices for Microsoft Dynamics CRM Online service
New Market Research Offers Overview Of Global Intrusion Prevention System
Products and Releases  |  7/23/2012  | 
TechNavio's analysts forecast market to grow at a CAGR of 16.2 percent over the period 2011-2015
Research Finds 80 Percent Of Companies Do Not Use The Cloud Services They Want Due To Security Fears
Products and Releases  |  7/20/2012  | 
Meantime, 70 percent of companies would use these services if they were as robust as internal tools, according to Varonis Systems
Trend Micro Upgrades Mobile Device Management With Security And App Controls
Products and Releases  |  7/20/2012  | 
TMMS 8.0 enhances the enforcement of existing password and encryption policies as well as provides more granular remote wipe capabilities
Bayshore Networks Announces General Availability Of SingleKey V5.0
Products and Releases  |  7/20/2012  | 
Upgrades include advanced application behavior profiling
Norman Rolls Out New Version Of Malware Analyzer G2
Products and Releases  |  7/20/2012  | 
Norman Malware Analyzer G2 provides Hybrid SandBoxing
Black Hat Partners With The Electronic Frontier Foundation To Support Researchers At Black Hat USA 2012
Products and Releases  |  7/20/2012  | 
EFF has been providing legal advice to security researchers at Black Hat since 2008
Corero Network Security Launches ReputationWatch For Real-Time IP Address Blocking Of DDoS Attacks
Products and Releases  |  7/20/2012  | 
ReputationWatch identifies and blocks access to bad IP addresses in real time
GFI Software And OPSWAT Bring Easy-To-Deploy, Advanced Malware Analysis To The Enterpris
Products and Releases  |  7/20/2012  | 
Preconfigured sandbox appliance helps businesses combat the growing threat from advanced persistent threats and targeted cyberattacks
Palo Alto Networks Announces Pricing Of Initial Public Offering
Products and Releases  |  7/20/2012  | 
Pricing of IPO offering of 6,200,000 shares of common stock at $42 per share
CareerBuilder’s IT Mid-Year Job Forecast Points To Steady Hiring Picture In Back Half Of 2012
Products and Releases  |  7/19/2012  | 
Fifty-five percent of IT employers reported they are planning to hire full-time, permanent staff
BartVPN.com, A Guard Of Your Privacy, Launched
Products and Releases  |  7/19/2012  | 
Bart VPN guarantees its users total Internet anonymity
SOTI Offers Advanced Management And Security For Android Devices
Products and Releases  |  7/19/2012  | 
Currently, Android provides limited management and security APIs for MDM vendors to leverage
Page 1 / 3   >   >>


More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.