Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in August 2012
Page 1 / 2   >   >>
The Top Internet Dangers For Kids
Products and Releases  |  8/31/2012  | 
Parents are getting increasingly worried about the ease with which undesirable content can be accessed online, according to Kaspersky Lab
Zscaler Secures $38 Million Investment Round
Products and Releases  |  8/31/2012  | 
Company is planning to use the new funding to further accelerate its go-to-market strategy with expanded sales and marketing
Cloud Security Alliance Forms Big Data Working Group
Products and Releases  |  8/30/2012  | 
Group’s immediate focus will be to develop an experimental platform of test data sets from different industry verticals
Secunia Launches Corporate Software Inspector 6.0
Products and Releases  |  8/30/2012  | 
Secunia CSI 6.0 combines vulnerability intelligence, vulnerability scanning and patch creation with patch deployment tool integration
PhishMe Inc. Appoints Websense Inc. Chief Security And Strategy Officer To Executive Board
Products and Releases  |  8/29/2012  | 
Jason Clark will play a key role in PhishMe’s expansion in the U.S. and abroad
Kaspersky Lab Publishes New Research about Wiper, the Destructive Malware Targeting Computer Systems In April 2012
Products and Releases  |  8/29/2012  | 
Analysis provides insights into Wiper’s highly effective method of destroying computer systems
Arbor Adds To Its Coalition To Stop DDoS
Products and Releases  |  8/28/2012  | 
StarHub has joined Arbor’s Cloud Signaling Coalition
Sensage Study Reveals Lack Of Consistency And Process Improvement In Security Management
Products and Releases  |  8/28/2012  | 
Study finds a downward trend in IT’s ability to consistently coordinate, measure, and improve security data management processes
Companies Still Struggling With Cloud Security: Reported Higher Incidence Of Data Security Lapse Or Issue From 2011
Products and Releases  |  8/28/2012  | 
Trend Micro's annual global cloud security survey found that with greater cloud adoption comes more security issues for companies all over the world.
Trend Micro Launches Trend Ready For Cloud Service Providers Program
Products and Releases  |  8/28/2012  | 
Program will allow both Trend Micro and select Trend Ready partners to verify the compatibility of Trend Micro products within leading cloud service providers' infrastructures
Cirago Unveils iAlertTag -- A Bluetooth 4.0 Smart Device That Wirelessly Secures, Alerts, And Locates Your iPhone
Products and Releases  |  8/27/2012  | 
iAlertTag creates wireless link with phone and tag so when they are separated, both devices vibrate and produce an alarm sound
SafeNet Enables Security For Mission-Critical Apps In VMware Environments
Products and Releases  |  8/27/2012  | 
ProtectV provides a complete data encryption solution for virtualized and cloud environments
EU Agency ENISA Report: Incidents Remain Undetected Or Not Reported
Products and Releases  |  8/27/2012  | 
Analysis underlines important steps forward, but also identifies gaps in national implementation
Barracuda Networks Offers Free Email Security for Six Months To Google Postini Customers
Products and Releases  |  8/24/2012  | 
Transition plan is offered to customers who are looking to replace Google Postini
Clutch Mobile Secures Data Across Device, Apps, Network
Products and Releases  |  8/24/2012  | 
Cloud-based service works across three layers: the mobile device, the applications on the device, and the network
Mocana Secures $25 Million In New Funding
Products and Releases  |  8/23/2012  | 
Trident Capital leads new round
International Student Competition 'CyberSecurity For The Next Generation' Kicks Off In North America With Call For Papers
Products and Releases  |  8/23/2012  | 
The first round, the North American Cup, is now accepting paper submissions from students
Fixmo Partners With SmartOffice For Secure Document Management On iOS And Android Devices
Products and Releases  |  8/22/2012  | 
Companies will provide end users at government and enterprise customers with the ability to securely create, edit, and manage corporate documents
Fortinet Further Enhances Bring-Your-Own-Device (BYOD) Network Security Solution With New Mobile Clients
Products and Releases  |  8/22/2012  | 
Introducing new versions of its FortiClient application for iOS and Android platforms
eSoft Expands Product Line With Low-Cost Security Appliance
Products and Releases  |  8/22/2012  | 
InstaGate 404S offers business-grade security for up to 15 Internet-connected client machines
Aveksa Extends Business-Driven Identity And Access Management To The Cloud
Products and Releases  |  8/22/2012  | 
Solution unifies the management of identities and access across internal and external environments
Sophos' New USB Wireless Access Point Provides WLAN For Remote Offices
Products and Releases  |  8/22/2012  | 
Sophos AP 5 connects to the Sophos RED via a USB port
3eTI’s New High-Speed Crypto Device To Offer Layer 3 IP-Based Security
Products and Releases  |  8/21/2012  | 
EtherGuard L3 will offer network operators more flexible configuration options using TCP/IP routing for securing critical data links
SailPoint Unveils IdentityIQ 6.0
Products and Releases  |  8/21/2012  | 
IdentityIQ 6.0 manages access while reducing IT risk and meeting stricter compliance requirements
Fortinet Introduces New FortiManager, FortiAnalyzer, And FortiMail Hardware Platforms
Products and Releases  |  8/21/2012  | 
Platforms designed for SMB and enterprise branch office customers in need of more scalable device management
Trend Micro/Savvis Partner For Cloud Security
Products and Releases  |  8/21/2012  | 
Incorporating virtual intrusion prevention (vIPS) into the Savvis cloud
ThreatMetrix Enhances Protection Against Account Takeovers And Fraudulent Payments
Products and Releases  |  8/21/2012  | 
Latest release of ThreatMetrix Cybercrime Defender Platform provides VPN and phishing detection with advanced device identification and malware protection
ForeScout Adds Mobile Security To NAC As A Service For MSPs
Products and Releases  |  8/21/2012  | 
MSP package teams ForeScout Mobile add-on modules with NAC solution, CounterACT
Wave Launches Cloud-Based Management Of Self-Encrypting Devices
Products and Releases  |  8/21/2012  | 
Subscription-based service provides enterprise-wide management of self-encrypting drives
Oil & Gas Critical Infrastructure & Asset Security Forum Set For Vienna Next Month
Products and Releases  |  8/21/2012  | 
Designed to help oil and gas organizations working in highly vulnerable operational environments to optimise their security strategies
Visa To Launch Encryption Service to Help Protect Sensitive Cardholder Data And Improve Merchant Security
Products and Releases  |  8/21/2012  | 
Visa encryption service to be available to merchants, acquirers, and processors in 2013
SafeNet Delivers New Class Of Crypto To Storage Data
Products and Releases  |  8/20/2012  | 
StorageSecure provides a highly secure alternative to full-disk encryption technology
CSA Announces Open Certification Framework For Cloud Providers
Products and Releases  |  8/20/2012  | 
Industry initiative offers cloud providers a trusted global certification scheme
Symplified Taps Quest Software Exec As New CEO
Products and Releases  |  8/20/2012  | 
Former Quest Software executive Shayne Higdon will succeed Eric Olden as the company's second CEO
Arrive Systems Touch Screen Devices Infected With Computer Virus
Products and Releases  |  8/20/2012  | 
Malware is particularly dangerous to a network environment
Foreground Security And CCSi Awarded $30 Million Contract With Centers For Medicare & Medicaid Services (CMS)
Products and Releases  |  8/20/2012  | 
eCloud provides centralized hosting, oversight, and management of the agency’s IT systems
Atlas Venture, Matrix Partners Back sqrrl To Make Big Data Secure, Scalable, And Adaptable
Products and Releases  |  8/20/2012  | 
Chris Lynch of Atlas and Antonio Rodriguez of Matrix will join the company’s board
General Dynamics To Acquire Fidelis Security Systems
Products and Releases  |  8/20/2012  | 
Transaction complements General Dynamics' cybersecurity solutions portfolio
Beazley Forms BBR Services
Products and Releases  |  8/20/2012  | 
New business unit dedicated to helping clients that have suffered a data breach
The Identity Theft Resource Center Launches Public Wireless Internet Survey
Products and Releases  |  8/20/2012  | 
Survey to discover the habits of consumers using public wireless Internet connections
Authentify Rolls Out New Mobile And PC Out-Of-Band Authentication Service
Products and Releases  |  8/16/2012  | 
2CHK out-of-band mobile or PC service for two-factor authentication replaces weak password security
NSS Labs Tests Top Consumer Anti-Virus Products For Protection Against New Critical Microsoft Vulnerabilities
Products and Releases  |  8/15/2012  | 
Nine of 13 popular consumer antivirus products tested failed to provide adequate protection against exploits
NetAuthority Rolls Out Device Authentication Service To Thwart Man-In-The-Browser Attacks
Products and Releases  |  8/15/2012  | 
NetAuthority offers support for Windows, Mac, and Linux end-user devices
Perimeter E-Security Announces Archive Anywhere For Microsoft Office 365
Products and Releases  |  8/15/2012  | 
Archive Anywhere helps organizations provide secure messaging for employees and reduce legal liability
Financial Institutions Are Losing Clients As A Result Of A Single Fraud Attack
Products and Releases  |  8/14/2012  | 
Third annual Guardian Analytics and Ponemon Institute 'Business Banking Trust Study' detects widespread fraud and loss of funds
Prolexic Exposes Vulnerabilities In Dirt Jumper DDoS Toolkit Family
Products and Releases  |  8/14/2012  | 
PLXsert has also issued a public threat advisory on the newest member of the Dirt Jumper family, Pandora
Palo Alto Networks Discovers Critical Vulnerabilities In Windows Print Spooler And Remote Administration Protocol
Products and Releases  |  8/14/2012  | 
Vulnerabilities allow attackers to remotely execute code and take control of systems
Alert Logic Launches First Security-As-A-Service Web Application Firewall Solution
Products and Releases  |  8/13/2012  | 
Alert Logic Web Security Manager with ActiveWatch includes firewall protection and blocking capabilities
Sophos Helps Businesses Embrace BYOD With Newest Release Of Mobile Device Management Solution
Products and Releases  |  8/13/2012  | 
Sophos Mobile Control 2.5 offers easy integration with existing IT infrastructure
Security Industry Association Submits Comments On FIPS 201-2
Products and Releases  |  8/13/2012  | 
SIA’s PIV Working Group contributed comments and proposed improvements to make the PIV card more usable in physical access control applications
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file