Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in August 2013
Page 1 / 2   >   >>
New Study Reveals Only 11% of Information Security Managers Trust Security Level Of Their Applications
Products and Releases  |  8/30/2013  | 
Quotium research shows large majority of security managers think their organizations' applications are still vulnerable to hacker attacks
Tenable Launches Security “App Store” For SecurityCenter 4.7
Products and Releases  |  8/29/2013  | 
SecurityCenter 4.7 will provide searchable catalog of apps that can be used to customize the dashboard
Social Networks: Can Robots Violate User Privacy?
Products and Releases  |  8/29/2013  | 
High-Tech Bridge experimented to verify how the 50 largest social networks, Web services, and free emails systems respect – or abuse - privacy of their users
HP Fortify Static Code Analyzer 4.0 Speeds Software Security Assessment By 10 Times
Products and Releases  |  8/29/2013  | 
New solution also reduces false positives by 20 percent over previous versions of the product
Finjan Holdings Subsidiary Files Patent Infringement Lawsuit Against Blue Coat Systems
Products and Releases  |  8/29/2013  | 
Finjan alleging infringement of patents relating to endpoint, Web, and network security technologies
StrikeForce Technologies Inc.'s GuardedID Keystroke Encryption Patent Granted
Products and Releases  |  8/28/2013  | 
GuardedID encrypts every keystroke typed on a keyboard
Small Business Authority's Survey Shows Overwhelming Majority of Independent Business Owners Believe Their Website Is Secure
Products and Releases  |  8/28/2013  | 
Findings from August survey is 86 percent of business owners feel that current website is secure
App Helps Secure Mobile Devices, Reports Security Status To Processor
Products and Releases  |  8/28/2013  | 
SecurityMetrics MobileScan includes acquirer/ISO access to a Merchant Compliance Console
Gateprotect Firewall Gets Hardware Boost
Products and Releases  |  8/28/2013  | 
GPO series has been equipped with the latest processors and more RAM
F-Secure Finds Women And Men Are Hard To Tell Apart In The Cloud
Products and Releases  |  8/27/2013  | 
When asked how much digital content in terms of photos, videos, documents and other files they have on their devices, women are less likely to know
Xceedium Extends Privileged Identity Management Protection To VMware vShield And vCloud
Products and Releases  |  8/27/2013  | 
Xsuite provides protection for both host systems running on the VMware hypervisor, and the vSphere and vCloud management consoles
Agiliance Adds BI Training Ror Its Risk Management Platform
Products and Releases  |  8/27/2013  | 
Column Technologies, on behalf of Agiliance, will provide virtual and on-premise Jaspersoft training services to Agiliance RiskVision customers
Bloxx Announces Secure Sockets Layer Intercept (SSLI) Software Development Kit For Security Solution Providers
Products and Releases  |  8/27/2013  | 
Aimed at security application developers seeking to add SSL traffic intercept capabilities to their Web content filtering, firewall, or UTM solutions.
Centrify Delivers Unified Identity Solution For Workplace Mac Users And Their Mobile Devices
Products and Releases  |  8/27/2013  | 
Centrify User Suite, Mac Edition integrates on-premise and remote Macs and mobile devices with Microsoft Active Directory
Check Point Launches Cloud Emulation Sandboxing Service To Tackle Zero-Day Attacks
Products and Releases  |  8/27/2013  | 
ThreatCloud Emulation cloud service is based on a global, companywide monthly quota of scanned files
HyTrust Raises $18.5 Million In Series C financing
Products and Releases  |  8/26/2013  | 
Funding from new investors Intel Capital, Fortinet, VMware, and In-Q-Tel, with participation by existing investors Granite Ventures, Cisco, Trident Capital, and Epic Ventures
Dell SecureWorks Warns Of Hacktivists Launching Multiprong Cyberattacks, Not Just DoS Attacks
Products and Releases  |  8/26/2013  | 
Hacktivists also launching SQLi and CSS attacks
WatchGuard Partners With NCP Engineering To Offer IPsec VPN Client For Microsoft Windows And Apple OS X Users
Products and Releases  |  8/23/2013  | 
VPN technology simplifies setup and enables one-click remote access for end users
ElcomSoft Speeds Up Phone Password Breaker, Enables Real-Time iCloud Recovery
Products and Releases  |  8/22/2013  | 
Forensic tool enables access to user data stored in Apple and BlackBerry mobile devices
U.S. Department of Homeland Security Awards HP Continuous Monitoring Services Contract
Products and Releases  |  8/22/2013  | 
One-year contract has a ceiling of $6 billion
CounterTack Partners With South Korean Providers For APT Defense
Products and Releases  |  8/22/2013  | 
CounterTack's endpoint protection platform, Sentinel, will play a critical role in countering the ongoing cyberattacks that threaten organizations in South Korea
Finjan Holdings Announces Reverse Stock Split
Products and Releases  |  8/21/2013  | 
12-for-1 reverse stock split of the company's common stock will be effective at the opening of trading on Thursday
SSH Appoints New Americas President And CEO
Products and Releases  |  8/21/2013  | 
Sami Ahvenniemi was most recently chairman of the SSH Communications Security board of directors
Mobile Banking Now 20% Of All Online Financial Transactions
Products and Releases  |  8/21/2013  | 
CEB TowerGroup will detail security risks that accompany rapid adoption of mobile banking in an upcoming webinar
GlobalSign Auto Enrollment Gateway Provides Automated Certificate Life Cycle Management For Microsoft Active Directory
Products and Releases  |  8/21/2013  | 
Solution automates enrollment, provisioning, and management of GlobalSign digital certificates for Windows environments
NCP Engineering Adds Ellipic Curve Crypto To Windows VPN Client And Gateway
Products and Releases  |  8/21/2013  | 
New versions designed to help enterprise customers yield higher level of security
Soldier Convicted Of Espionage Sentenced Today
Products and Releases  |  8/21/2013  | 
Pfc. Bradley E. Manning was found guilty of 20 offenses, including seven specifications of wrongful possession and transmission of national defense information
McAfee Quarterly Report Finds Increase In Mobile Threats
Products and Releases  |  8/21/2013  | 
Android-based malware achieves a 35 percent growth rate not seen since early 2012
New Citrix Worx App Gallery Provides Secure Mobile Apps
Products and Releases  |  8/21/2013  | 
Gallery has more than 100 committed third-party apps
Welsh, Carson, Anderson & Stowe To Acquire Alert Logic
Products and Releases  |  8/20/2013  | 
New funds will be used to accelerate growth through both geographic and product line expansion
Rapid7 Launches 2 New Security Products
Products and Releases  |  8/20/2013  | 
ControlsInsight and UserInsight focus on two core areas
Less Than Half Of IT Professionals Have Deployed Continuous Monitoring
Products and Releases  |  8/20/2013  | 
Study examined security controls and spending
CloudLock Adds Support For Google+, Enabling Large Enterprises To Apply CloudLock's Security And Audit Controls To Google+
Products and Releases  |  8/20/2013  | 
CloudLock's support for Google+ will help CIOs implement Google+ for their domain
Lookingglass And Ziften Partner To Deliver Threat Intelligence From The Internet To The Endpoint
Products and Releases  |  8/19/2013  | 
Combination of Lookingglass’ ability to monitor threats on the Internet and internal enterprise network with Ziften’s endpoint visibility provides end-to-end cyberthreat intelligence
Panda Security Launches 2014 Range With Multidevice Protection
Products and Releases  |  8/19/2013  | 
Panda Global Protection 2014 protects Windows, Mac, and Android
IBM Selected For DHS Cyber Initiative
Products and Releases  |  8/19/2013  | 
CDM Program moves the nation’s networks to a more real-time approach for the combat of advanced threats
Mobile Phone Using FPC Fingerprint Technology Launched By Fujitsu With DoCoMo
Products and Releases  |  8/19/2013  | 
Fujitsu F-07E Android smartphone has swipe sensor technology
NSA Creates Partnership With North Carolina State University
Products and Releases  |  8/19/2013  | 
Laboratory for Analytic Sciences to focus on big data problems
IBM To Acquire Trusteer
Products and Releases  |  8/19/2013  | 
New IBM Cybersecurity Software Lab in Israel will focus on mobile and application security, counterfraud, and malware detection
Newly Launched WebTitan Cloud, A Powerful Web Filtering Service For SMBs
Products and Releases  |  8/16/2013  | 
New cloud-based Web filtering service enables companies to monitor, control, and protect users online
VMware Announces Expanded Analytics For Log Insight
Products and Releases  |  8/16/2013  | 
Content packs enable VMware vCenter Log Insight to consume unstructured data from a wider variety of sources
Prosperoware Breaks New Ground In Managing Internal Data Security With Milan 3.0
Products and Releases  |  8/16/2013  | 
Milan 3.0 adds capability to manage information security across multiple systems on a "need to know" basis
PCI DSS 3.0 Change Highlights
Products and Releases  |  8/15/2013  | 
Version 3.0 to focus on flexibility, education and awareness, and security as a shared responsibility
CSC Offers GRC Solution As A Service
Products and Releases  |  8/14/2013  | 
CSC Horizon integrates data and reporting from existing cybersecurity controls into one view
Avira Launches Free Android Anti-Virus 2.0 For Smartphones And Tablets
Products and Releases  |  8/14/2013  | 
Free app offers antivirus scanning and removal
Fast Tracking AppSec Test Results - NT OBJECTives & Denim Group Partnership
Products and Releases  |  8/14/2013  | 
ThreadFix is now integrated with NTOSpider application scanner
Joomla Exploit Results In Thousands Of Infected Systems, Targeted Attacks Against EMEA Banks
Products and Releases  |  8/14/2013  | 
Versafe report summarizes the discovery of a vulnerability that had put Web sites hosted on the Joomla content management system at risk of being hijacked
Identity And Access Management (IAM) Market Worth $10.39 Billion By 2018
Products and Releases  |  8/14/2013  | 
Report identifies drivers and restraints for this market with insights on trends, opportunities, and challenges
CounterTack Awarded Patent Extension For Next-Generation Endpoint Security In New Global Markets
Products and Releases  |  8/13/2013  | 
Patent portfolio extended into Japan and Australia
Prolexic DDoS Protection Service Stops Attackers From Bringing Down 1ink.com e-Commerce Sites
Products and Releases  |  8/13/2013  | 
1ink.com is an online retailer of replacement inkjet and laser toner cartridges
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file