Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in August 2012
<<   <   Page 2 / 2
Rapid7 Announces Latest Version Of Nexpose
Products and Releases  |  8/13/2012  | 
New version reduces signal-to-noise ratio for vulnerability management
Trend Micro Reports Second Quarter Results
Products and Releases  |  8/13/2012  | 
For the second quarter, Trend Micro posted consolidated net sales of US $287 million
Mac OS X Users Beware: Advanced Malware On The Rise
Products and Releases  |  8/13/2012  | 
ThreatMetrix Labs “Professional OS X Malware – A Reality” report outlines sophistication of the Crisis Trojan’s programming code
Guardian Analytics Unveils New Behavior-Based Fraud Prevention Solution For ACH Transactions
Products and Releases  |  8/13/2012  | 
FraudMAP ACH uncovers suspicious activity, eliminating manual reviews and reducing risk of fraudulent ACH payments
Damballa Principal Scientist Presents New Technique For Detecting DGA-Based Malware
Products and Releases  |  8/10/2012  | 
Pleiades detects Domain Generation Algorithm-based botnets
ThreatMetrix: Evolving Malware Turns OS X Lion From Predator Into Prey
Products and Releases  |  8/10/2012  | 
Report outlinies code-level details on how new strains of malware penetrate Apple's OS X operating system
Trend Micro Unveils Free MacClean Tool
Products and Releases  |  8/9/2012  | 
MacClean is a free clean-up solution designed for Apple fans that may be infected by the Morcut malware
Asurion Launches 'ProtectToWin' Mobile Security Application Contest
Products and Releases  |  8/9/2012  | 
Contest designed to introduce the company's mobile protection application to a wider audience
NextAdvisor.com Announces Launch Of Mac Security Software Category
Products and Releases  |  8/9/2012  | 
Norton Internet Security 5 For Mac came out on top
LUMINEX And Nirvanix Introduce World's First Cloud-Based Tape Vaulting Solution For Mainframe Environments
Products and Releases  |  8/9/2012  | 
Using CloudSAFE, data centers can leverage the Nirvanix Cloud Storage Network as a secure remote repository for critical data
CA/Browser Forum's Mandated Royalty-Free Intellectual Property Policy Change Spurs Entrust To Withdraw From Organization
Products and Releases  |  8/9/2012  | 
Policy also discriminates against certain corporate and ownership structures
Akamai Releases First Quarter 2012 "State Of The Internet" Report
Products and Releases  |  8/9/2012  | 
Approximately 42 percent of observed attack traffic originated in Asia Pacific/Oceania region
Motorola Solutions Invests In Fixmo
Products and Releases  |  8/9/2012  | 
Fixmo’s flagship products, Fixmo Sentinel and Fixmo SafeZone, help organizations manage their secure mobile devices
Mobile Users Face Olympics Scams And Malicious Android Applications, According To GFI Software
Products and Releases  |  8/8/2012  | 
OpFake and Boxer malware families continue to evolve and infect smartphones and tablets
Consumerization Is Here: Surveys From Trend Micro Confirm That BYOD Is Overtaking The Workplace And That Device Security Is Top Concern
Products and Releases  |  8/8/2012  | 
Surveys show that enterprises are still struggling to address the issue of consumerization
GFI Software Helps SMBs Identify Sensitive Data Leaks With GFI MailArchiver 2012
Products and Releases  |  8/7/2012  | 
New platform flags emails containing credit card and Social Security numbers, as well as emails related to job searches
Palo Alto Networks Next-Generation Firewall Achieves ICSA Labs Certification For Network Firewalls
Products and Releases  |  8/7/2012  | 
PA-500, PA-2000 and PA-4000 series evaluated against and passed ICSA Labs Modular Firewall Product Certification Criteria version 4.1x
SignatureLink Introduces The First-Ever All-In-One eCommerce Fraud Solution
Products and Releases  |  8/7/2012  | 
SecureBuy features a payment-neutral chargeback management system available
More Than Six Million New Malware Samples Were Created In Q2 2012, According To PandaLabs
Products and Releases  |  8/7/2012  | 
Three out of every four malware infections are caused by Trojans; new variant of Police Virus emerges
New White Paper Calls For Collaboration Among PCI DSS Technology Vendors
Products and Releases  |  8/7/2012  | 
Mako Networks paper calls for research and cooperation among vendors to make card transactions and consumer data safer in small businesses
DNS System Enables ISPs To Meet New FCC Anti-Botnet Code Of Conduct
Products and Releases  |  8/6/2012  | 
Xerocole, Damballa partner to identify and take corrective action against subscriber machines that are infected with botnet malware
WatchGuard Sets New Standard For Next-Generation UTM
Products and Releases  |  8/6/2012  | 
WatchGuard XTM 5 Series network security appliances aimed at midsize businesses
KnowBe4 And Kevin Mitnick Offer Free Cybercrime Prevention Tips For Upcoming Republican National Convention
Products and Releases  |  8/6/2012  | 
Tips created to help convention attendees protect their personal information and mobile devices from cyberattacks
Critical Watch Releases First Countermeasure Recommendation Engine
Products and Releases  |  8/6/2012  | 
ACI Recommendation Engine consolidates multiple disparate data points into a unified view of risks
New USB Encryption Solution Protects At Risk Data, Prevents Data Breaches
Products and Releases  |  8/6/2012  | 
Enigma module provides real-time full disk encryption for any USB mass storage class (MSC) drive
Acunetix And Bitdefender Team Up To Protect Websites From Malware
Products and Releases  |  8/3/2012  | 
New Acunetix service now integrates Bitdefender to instantly detect malware and allows for easy removal
eSoft Announces Security Appliance Upgrades
Products and Releases  |  8/2/2012  | 
Also announces reduced pricing for all of its UTM solutions
Bit9 Receives $34.5 Million In VC Funding
Products and Releases  |  8/2/2012  | 
VC round was led by Sequoia Capital
Liaison Technologies Token Manager 2.2 Further Enhances Enterprise Data Security
Products and Releases  |  8/2/2012  | 
Token Manager 2.2 offers high-volume connection pooling and improved caching of static data
Barracuda Web Filter Adds New Social Media Controls Inbox
Products and Releases  |  8/2/2012  | 
Barracuda Web Filter Firmware 6.0 helps organizations assess and enforce social media policy in the workplace
China, United States Primary Source Of Malicious IPs
Products and Releases  |  8/2/2012  | 
New infographic from AlienVault Open Threat Exchange details trends in malicious cyberactivity
IBM Introduces New Class Of Network Security Appliance
Products and Releases  |  8/2/2012  | 
Intrusion prevention appliance helps clients address advanced attacks
NCC Group Acquires Matasano For $13 Million
Products and Releases  |  8/2/2012  | 
Purchase of Matasano is the Group's eighth in the network testing and software security space
Metaforic Alerts Financial Institutions to Increasing Security Risks Emerging From Mobile Financial Applications
Products and Releases  |  8/1/2012  | 
Cybercriminals increasingly are attracted by the potential financial gains made possible by diverting funds through mobile financial applications
BeyondTrust Now Supports Multitenant For Managed Security Service Providers
Products and Releases  |  8/1/2012  | 
Retina CS 3.5 allows users to easily and efficiently visualize the before and after effects of remediation recommendations
Eleven Analyzes Impact Of Botnet Takedowns On Spam Volumes
Products and Releases  |  8/1/2012  | 
Few botnet takedowns had a noticeable impact on spam volumes
Enterprises Can Now Be Their Own Identity Provider
Products and Releases  |  8/1/2012  | 
SecureAuth IdP is a two-factor identity provider (IdP) solution that enables companies to become their own IdP
Commtouch To Acquire FRISK Software International's Antivirus Business
Products and Releases  |  8/1/2012  | 
FRISK is a provider of antivirus solutions for the OEM, corporate, and consumer markets
<<   <   Page 2 / 2


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21238
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping bec...
CVE-2021-21239
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ...
CVE-2021-21253
PUBLISHED: 2021-01-21
OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attacker...
CVE-2020-4966
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the...
CVE-2020-4968
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192427.