Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in August 2009
Page 1 / 3   >   >>
Equifax Bolsters Personal Information Solutions Suite With Identity Report
Products and Releases  |  8/31/2009  | 
Equifax Identity Report provides consumers with a high-level snapshot of their identity information and a summary of their credit standing for their own review or to share with others
Trend Micro Announces New Web Gateway Security Solution
Products and Releases  |  8/31/2009  | 
Web Gateway Security solution integrates the InterScan Web Security Virtual Appliance 5.0 product and the new Advanced Reporting and Management module
Proofpoint, Purewire Deliver Joint SaaS Email- And Web-Based Security For College In Georgia
Products and Releases  |  8/31/2009  | 
TCSG deployed the Proofpoint ENTERPRISE SaaS email security solution to protect more than 10,000 inboxes
VeriSign Launches 90-Day Free Trial of Identity Protection
Products and Releases  |  8/31/2009  | 
VeriSign Identity Protection (VIP) Authentication Service available free for three months to organizations looking to protect their business-to-business portals and customer-facing Web sites
3Com Integrates Security Products With TippingPoint's
Products and Releases  |  8/31/2009  | 
The Secure Network Fabric includes the integration of 3Com's industry-leading TippingPoint intrusion prevention system (IPS) technology and its H3C enterprise network and security solutions
HITRUST Working On IT Security Product Certification For Healthcare Industry
Products and Releases  |  8/31/2009  | 
HITRUST to streamline process of identifying and evaluating information security solutions
OpenAjax Alliance Delivers Software For More Secure Enterprise Mashups
Products and Releases  |  8/31/2009  | 
OpenAjax Hub 2.0 approved as an industry standard for more secure Web 2.0 mashup applications
TrustMe.com Launches Security Solution For Craigslist Users
Products and Releases  |  8/31/2009  | 
TrustMe.com supports quick transactions by establishing trust between legitimate users interested in responsible interaction
Conficker/Downadup Dominates BitDefender's Top Ten Threats For August
Products and Releases  |  8/31/2009  | 
Conficker re-emerges after eight months as top e-threat, while the second spot goes to an unusual suspect
Webfusion Offers Free SSL Certificates
Products and Releases  |  8/28/2009  | 
Offer from Web hosting company available until September 30
Code Green Networks Announces Scalable Data Loss Prevention For Large Enterprises
Products and Releases  |  8/28/2009  | 
New CI-3000 appliance extends TrueDLP solution to large-scale deployments
Security Expert From Trustwave's SpiderLabs To Speak At International Association Of Fraud Crime Investigators
Products and Releases  |  8/27/2009  | 
Charles Henderson, practice manager for application security, will look at failures in application security that have lead to real-world compromises
Affinion Security Center Augments Personal Information Monitoring Capabilities
Products and Releases  |  8/27/2009  | 
Company adds new set of personal identity monitoring benefits to its ID Theft protection suite, dubbed "IdentitySecure Monitoring"
Newmium Working On iXRIOS Secure Operating System
Products and Releases  |  8/27/2009  | 
iXRIOS offers high-end data processing with complete security and portability, and a scaled-down version for mobile computing named iXRIOS-Soli
Fluke Networks Completes Acquisition of AirMagnet
Products and Releases  |  8/26/2009  | 
Acquisition of AirMagnet could bolster Fluke Networks' position in the fast-growing area of Wi-Fi testing and security
Social Networking Poll Shows Users More Vulnerable Than Ever
Products and Releases  |  8/26/2009  | 
AVG and CMO Council survey shows that the widespread and growing use of social networks at home and work is creating serious danger of Web-borne identity theft and infection
BitDefender Offers Twitter Spam Protection Tips
Products and Releases  |  8/26/2009  | 
How users can avoid falling prey to some of the most common tricks regularly employed by hackers
ReallyWho.com Launches Web 2.0 Identity Verification Service For Twitter, Facebook
Products and Releases  |  8/26/2009  | 
ReallyWho technology uses information generated from public and commercial records to formulate questions that can only be affirmed by the person being verified
WiKID Systems Upgrades Strong Authentication Server, iPhone Token Client
Products and Releases  |  8/26/2009  | 
Adds support for Google Apps SSO/SAML protocol, vendor-specific radius attributes, and built-in self-service initial validation module for Active Directory users
Archer Technologies Rolls Out GRC Solution
Products and Releases  |  8/26/2009  | 
Business Continuity Management (BCM) solution combines business continuity, disaster recovery, and crisis management
MX Logic: Healthcare Remains Top Spam Category
Products and Releases  |  8/26/2009  | 
Hackers also turn up the heat, according to September MX Logic Threat Forecast & Report
Voltage Security Reports Growth For First Half Of Fiscal '09
Products and Releases  |  8/25/2009  | 
Total contract value of deals in the first half grows by more than 70%
StillSecure, Force10 Networks Extend Partnership In Convergence Of Network Devices And Security
Products and Releases  |  8/25/2009  | 
Companies will enable 802.1x-based network access control (NAC) on all Force10 Ethernet switches
All GSM Calls Under Threat From Hackers
Products and Releases  |  8/25/2009  | 
At the recent Hacking at Random (HAR) conference, Karsten Nohl detailed plans for cracking standard GSM cell phone encryption, known as A5/1
Bank Of Hawaii Merchants Achieve Record PCI Compliance
Products and Releases  |  8/25/2009  | 
Bank of Hawaii selected SecurityMetrics' PCI Site Certification Services for Merchants to address merchant data security needs for PCI
GlobalSign Partners With Vietnam's Government Licensed Public Certificate Authority
Products and Releases  |  8/25/2009  | 
GlobalSign will provide V-SIGN with operational support and consultation services in order to develop and deploy a range of e-government solutions
Accertify, Rapleaf Partner On Online Fraud Protection
Products and Releases  |  8/25/2009  | 
Companies announce that Rapleaf's email reputation service will be added to Accertify's Interceptas platform
K7 Computing Launches K7 TotalSecurity Version 10.0
Products and Releases  |  8/25/2009  | 
Advanced protection features include "Pre-Installation Super Scanner" tool, which detects and eliminates threats even before the installation of the main package
Atmel To Incorporate Cryptography Research Security Patents In Chips
Products and Releases  |  8/25/2009  | 
License also covers software executing on Atmel chips, allowing Atmel's customers to develop their own security countermeasures without a separate license from Cryptography Research
AppGate Launches Version 9.1 Of AppGate Security Server
Products and Releases  |  8/25/2009  | 
New features include Chained Authentication and a new virtual appliance image for VMware
HyTrust Unveils HyTrust Appliance 1.5
Products and Releases  |  8/25/2009  | 
HyTrust Appliance 1.5 enforces granular authorization of all virtual infrastructure management operations, according to user role, object, label, protocol, and IP address
Sentrigo Extends Database Security Offerings
Products and Releases  |  8/25/2009  | 
Hedgehog 3.0 now supports Microsoft SQL Server 2008 running on Windows Server 2008, as well as SQL Server 2005 and SQL Server 2000 running on earlier Windows platforms
Fidelis Rolls Out XPS Edge
Products and Releases  |  8/24/2009  | 
Fidelis XPS Edge is aimed at organizations with decentralized network egress points
New App Store Security Application To Protect Core iPhone Component
Products and Releases  |  8/24/2009  | 
ContactCrypt 1.6 encrypts sensitive personal and business data stored in the Contacts section of the iPhone
Two SCIPP International Certificate Programs Enter ANSI-CAP Program
Products and Releases  |  8/24/2009  | 
Program accredits certificate issuing bodies against the new American National Standard " ASTM E-2659, "Standard Practices for Certificate Programs"
Yoggie, Lenovo Team With 'Always-On' Secured Email
Products and Releases  |  8/24/2009  | 
New device combines Lenovo ConstantConnect and Protect 2.0 to allow users to send and receive emails immediately after turning on their laptop
SECNAP Network Security Waives Expense For SpammerTrap Email Security Purchases
Products and Releases  |  8/24/2009  | 
For a limited time, hardware will be provided at no charge for all SpammerTrap Email Security appliances purchased with a three-year service agreement
StillSecure Passes SAS 70 Type II Service Audit
Products and Releases  |  8/24/2009  | 
Meets audit for the third straight year through its ProtectPoint managed security services
Tata Communications Launches Internet Clean Pipe Service
Products and Releases  |  8/24/2009  | 
Managed service will include will built-in DDoS detection and mitigation services
IronKey, Tresys Team On Malware Cleansing Protection For USBs
Products and Releases  |  8/24/2009  | 
Companies announce integration of IronKey's FIPS 140-2 Level 3 validated secure flash drives with Tresys' FiST (File Sanitization Tool)
CyberDefender Announces Final Results Of Offer To Warrant Holders
Products and Releases  |  8/24/2009  | 
Company raises more than $2 million from proceeds received as a result of the exercise of warrants covering 1,838,952 shares of common stock
Motorola Introduces Wireless LAN Security Solution for Remote Wireless Security Testing
Products and Releases  |  8/21/2009  | 
Wireless vulnerability assessment solution helps protect wireless networks from outside threats, reduces third-party consultation costs, and ensures regulatory compliance and reporting
Cyveillance Testing: Leading AV Vendors Not Keeping Pace with Influx of Malware and Phishing Attacks
Products and Releases  |  8/20/2009  | 
More than half of active malware and phishing threats on the Internet continue to go undetected
Network Intercept Releases Keystroke Interference Tool
Products and Releases  |  8/20/2009  | 
Interferes with both known and unknown keystroke logging malware present on the user's computer
Nominum Upgrades Intelligent DNS System
Products and Releases  |  8/20/2009  | 
Lets service providers provide automatic protection to end users against a wide range of Internet threats as soon as they are discovered
Finjan a Permanent Injunction for Infringing Technology Found In McAfee Products
Products and Releases  |  8/20/2009  | 
Injunctions and extended damages were granted on McAfee's Webwasher and TSP products
AppGate Launches Version 9.1 Of AppGate Security Server
Products and Releases  |  8/19/2009  | 
New release feature chained authentication, new virtual appliance features
Webroot Names New President and CEO
Products and Releases  |  8/19/2009  | 
Former IBMer Dick Williams takes the helm at Webroot
PandaLabs: 600% Rise In Users Hit By ID Theft Malware
Products and Releases  |  8/19/2009  | 
Economic crisis, black market sales of credit card numbers, Paypal or Ebay accounts could be to blame
Rohati Systems Extends Security Solutions to Virtualized Data Centers and Clouds
Products and Releases  |  8/18/2009  | 
Rohati extends its on-premise security solutions to virtualized servers and off-premise cloud environments, software-as-a-service
Page 1 / 3   >   >>


Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...