Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in July 2012
Page 1 / 3   >   >>
SSH Communications Security Launches Industry-First DLP Auditing Solution
Products and Releases  |  7/31/2012  | 
CryptoAuditor helps prevent data loss across encrypted secure shell, RDP, and SFTP traffic
NCP Releases Universal IPsec Clients For Android
Products and Releases  |  7/31/2012  | 
NCP Secure Android Client and Premium Android Client ensure secure access to corporate networks from all Android applications
BeyondTrust Launches PowerBroker Mobile
Products and Releases  |  7/31/2012  | 
New offering integrates context-aware management with vulnerability and patch information
Trend Micro Comments On Senate Cybersecurity Act
Products and Releases  |  7/31/2012  | 
Announced support for the legislation
Akamai Reports Second Quarter 2012 Financial Results
Products and Releases  |  7/31/2012  | 
Revenue for the second quarter of 2012 was $331 million
Websense Security Labs Launches New Intelligence Services And Tools
Products and Releases  |  7/31/2012  | 
Websense CSI On-Demand and Live services help organizations pinpoint attack methods, processes, and data targets
Centrify Announces Support For Apple Mac OS X Mountain Lion With Active Directory-Based Security And Management
Products and Releases  |  7/31/2012  | 
DirectControl for Mac enables admins to use Active Directory and Windows Group Policy to centrally control Mac systems in the workplace
AVG Updates Mobilation AntiVirus For Android
Products and Releases  |  7/30/2012  | 
Update features a new push notification that will alert users as they approach their monthly data limit
ReaSoft Network Firewall 3: Corporate Firewall With DLP Elements
Products and Releases  |  7/30/2012  | 
ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, Webmail, ICQ, MSN, Internet communities, and other similar channels
Sophos Offers Free Antivirus App For Android Users
Products and Releases  |  7/30/2012  | 
Sophos Mobile Security automatically scans apps as users install them
Black Hat Survey: 36% Of Information Security Professionals Have Engaged In Retaliatory Hacking
Products and Releases  |  7/26/2012  | 
Some IS pros believe retaliatory attacks may discourage further attacks, according to nCircle
FireHost Selects Radware's Attack Mitigation System For Real-Time Network Attack Prevention
Products and Releases  |  7/25/2012  | 
FireHostwill use Radware's AMS as a key IT security solution across its network of secure cloud servers
Micro​soft/Trust​wave Expand ModSecurit​y To IIS And Nginx Servers
Products and Releases  |  7/25/2012  | 
ModSecurity is a free, open source Web application firewall
AccessData Releases Cyber Intelligence & Response Technology (CIRT) Version 2
Products and Releases  |  7/25/2012  | 
CIRT integrates network and computer forensics, malware analysis, large-scale data, auditing, and remediation
Appthority Unveils Hidden Security Risks Of Top Mobile Apps
Products and Releases  |  7/25/2012  | 
Report examines the security risks of the top 50 free iOS and Android apps
New RSA Service Helps Customers Detect And Shut Down Rogue Mobile Apps
Products and Releases  |  7/25/2012  | 
RSA FraudAction Anti Rogue App Service helps organizations discover fraudulent mobile apps that are leveraging customer brands to infect end users or steal credentials
Trend Micro Releases Security Roundup Report For Q2 2012
Products and Releases  |  7/25/2012  | 
Increasingly targeted and personalized attacks led to more than 140 million attacks that were blocked by Trend Micro against small businesses in the first half of the year
Symantec Names New President And CEO
Products and Releases  |  7/25/2012  | 
Steve Bennett, chairman of Symantec board, named president and chief executive officer; Dan Schulman appointed lead independent director
Radware's Attack Mitigation Black Belt Challenge Reveals IT Professionals' Strengths And Weaknesses Of Top Security Threats
Products and Releases  |  7/25/2012  | 
Pinpoints leading areas of knowledge that IT managers need to improve upon to enhance their attack mitigation proficiency
New Websense CyberSecurity Intelligence Services Provide Sandboxing, Forensics And Proactive Training To Combat Threats
Products and Releases  |  7/25/2012  | 
Websense CSI On-Demand and Live services help organizations pinpoint attack methods, processes, and data targets
Microsoft Security Toolkit Delivers New BlueHat Prize Defensive Technology
Products and Releases  |  7/25/2012  | 
EMET 3.5 makes it more difficult for attackers to exploit vulnerabilities and gain system access
SSH Communications Security Launches CryptoAuditor: Minimally-Invasive Enterprise Privileged User Access Auditing Solution
Products and Releases  |  7/25/2012  | 
Helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with inline, real-time and transparent audit capabilities
GFI Survey Finds 12% of Consumers Would Use Mobile Location-Based Tracking To Keep Tabs On Their Spouses
Products and Releases  |  7/24/2012  | 
Location tracking also attractive to parents, with one in three saying they would use the feature to snoop on their teen’s whereabouts
HITRUST Expands Cybersecurity Center With Launch Of First Cyber Threat Analysis Service For Healthcare Industry
Products and Releases  |  7/24/2012  | 
Service is a new component of the recently announced HITRUST Cybersecurity Incident Response and Coordination Center
Analysis Of The Mobile Endpoint Security Products Market
Products and Releases  |  7/24/2012  | 
Report examines drivers and restraints for growth, pricing, distribution, and demand
VSS Monitoring Introduces New Network Packet Brokers To Enable Complete Networkwide Visibility And Performance
Products and Releases  |  7/24/2012  | 
vBroker appliances expand the capacity and interface flexibility of its packet broker solutions
GFI VIPRE Mobile Security Premium Now Available For Android Devices
Products and Releases  |  7/24/2012  | 
New app enables users to defend smartphones and tablets from viruses, monitor kids’ mobile activity, back up data, and remotely lock and wipe lost or stolen devices
Maxim's Security Manager Ensures Smart Grid Infrastructure Security
Products and Releases  |  7/24/2012  | 
MAX36025 adds secure encryption to critical points of data aggregation within the smart grid
Q2 2012 FireHost Web Application Attack Report Shows Sharp Rise In SQL Injections
Products and Releases  |  7/24/2012  | 
From April to June 2012, the Web applications, databases, and websites of FireHost’s customers were protected from a total of 17 million cyberattacks
Qualys Announces General Availability Of Its Dynamic Asset Tagging And Management Technology
Products and Releases  |  7/24/2012  | 
Technology enables customers to identify, categorize, and manage large numbers of assets in highly dynamic IT environments
HiSoftware And AIIM Survey Highlights Gaps In SharePoint Content Security
Products and Releases  |  7/24/2012  | 
The struggle between the open-nature of SharePoint and the need to secure sensitive data is clear in the reactions from respondents
WatchDox, Ponemon Institute Expose Enterprise Document Security Risks
Products and Releases  |  7/24/2012  | 
Study examines state of document-centric security in today’s corporate environment; identifies top risks
Context Presents 'Breaking .NET Through Serialization' At Black Hat USA
Products and Releases  |  7/24/2012  | 
Serialization vulnerabilities can lead to data disclosure or remote code execution, warns Context in white paper published today
GFI Software Launches GFI LanGuard 2012
Products and Releases  |  7/24/2012  | 
Solution includes combines vulnerability scanning, patch management, and network and software auditing
Novell Makes BYOD Enterprise Ready
Products and Releases  |  7/24/2012  | 
ZENworks Mobile Management automates the process of enrolling new devices
Avecto Reports Significant Growth Since Launch, Expands North America Presence
Products and Releases  |  7/23/2012  | 
Avecto closed out the year having significantly expanded operations in North America and Europe
Emulex OneConnect Network Xceleration Solution Provides Increased Performance With New Release Of Suricata
Products and Releases  |  7/23/2012  | 
FastStack Sniffer 10G provides greater vulnerability protection with lower packet drop rates
Microsoft Dynamics CRM Online Launches Trust Center
Products and Releases  |  7/23/2012  | 
Web site provides in-depth information about privacy and security practices for Microsoft Dynamics CRM Online service
New Market Research Offers Overview Of Global Intrusion Prevention System
Products and Releases  |  7/23/2012  | 
TechNavio's analysts forecast market to grow at a CAGR of 16.2 percent over the period 2011-2015
Research Finds 80 Percent Of Companies Do Not Use The Cloud Services They Want Due To Security Fears
Products and Releases  |  7/20/2012  | 
Meantime, 70 percent of companies would use these services if they were as robust as internal tools, according to Varonis Systems
Trend Micro Upgrades Mobile Device Management With Security And App Controls
Products and Releases  |  7/20/2012  | 
TMMS 8.0 enhances the enforcement of existing password and encryption policies as well as provides more granular remote wipe capabilities
Bayshore Networks Announces General Availability Of SingleKey V5.0
Products and Releases  |  7/20/2012  | 
Upgrades include advanced application behavior profiling
Norman Rolls Out New Version Of Malware Analyzer G2
Products and Releases  |  7/20/2012  | 
Norman Malware Analyzer G2 provides Hybrid SandBoxing
Black Hat Partners With The Electronic Frontier Foundation To Support Researchers At Black Hat USA 2012
Products and Releases  |  7/20/2012  | 
EFF has been providing legal advice to security researchers at Black Hat since 2008
Corero Network Security Launches ReputationWatch For Real-Time IP Address Blocking Of DDoS Attacks
Products and Releases  |  7/20/2012  | 
ReputationWatch identifies and blocks access to bad IP addresses in real time
GFI Software And OPSWAT Bring Easy-To-Deploy, Advanced Malware Analysis To The Enterpris
Products and Releases  |  7/20/2012  | 
Preconfigured sandbox appliance helps businesses combat the growing threat from advanced persistent threats and targeted cyberattacks
Palo Alto Networks Announces Pricing Of Initial Public Offering
Products and Releases  |  7/20/2012  | 
Pricing of IPO offering of 6,200,000 shares of common stock at $42 per share
CareerBuilder’s IT Mid-Year Job Forecast Points To Steady Hiring Picture In Back Half Of 2012
Products and Releases  |  7/19/2012  | 
Fifty-five percent of IT employers reported they are planning to hire full-time, permanent staff
BartVPN.com, A Guard Of Your Privacy, Launched
Products and Releases  |  7/19/2012  | 
Bart VPN guarantees its users total Internet anonymity
SOTI Offers Advanced Management And Security For Android Devices
Products and Releases  |  7/19/2012  | 
Currently, Android provides limited management and security APIs for MDM vendors to leverage
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file