Products and Releases

Content posted in August 2013
Page 1 / 2   >   >>
New Study Reveals Only 11% of Information Security Managers Trust Security Level Of Their Applications
Products and Releases  |  8/30/2013  | 
Quotium research shows large majority of security managers think their organizations' applications are still vulnerable to hacker attacks
Tenable Launches Security “App Store” For SecurityCenter 4.7
Products and Releases  |  8/29/2013  | 
SecurityCenter 4.7 will provide searchable catalog of apps that can be used to customize the dashboard
Social Networks: Can Robots Violate User Privacy?
Products and Releases  |  8/29/2013  | 
High-Tech Bridge experimented to verify how the 50 largest social networks, Web services, and free emails systems respect – or abuse - privacy of their users
HP Fortify Static Code Analyzer 4.0 Speeds Software Security Assessment By 10 Times
Products and Releases  |  8/29/2013  | 
New solution also reduces false positives by 20 percent over previous versions of the product
Finjan Holdings Subsidiary Files Patent Infringement Lawsuit Against Blue Coat Systems
Products and Releases  |  8/29/2013  | 
Finjan alleging infringement of patents relating to endpoint, Web, and network security technologies
StrikeForce Technologies Inc.'s GuardedID Keystroke Encryption Patent Granted
Products and Releases  |  8/28/2013  | 
GuardedID encrypts every keystroke typed on a keyboard
Small Business Authority's Survey Shows Overwhelming Majority of Independent Business Owners Believe Their Website Is Secure
Products and Releases  |  8/28/2013  | 
Findings from August survey is 86 percent of business owners feel that current website is secure
App Helps Secure Mobile Devices, Reports Security Status To Processor
Products and Releases  |  8/28/2013  | 
SecurityMetrics MobileScan includes acquirer/ISO access to a Merchant Compliance Console
Gateprotect Firewall Gets Hardware Boost
Products and Releases  |  8/28/2013  | 
GPO series has been equipped with the latest processors and more RAM
F-Secure Finds Women And Men Are Hard To Tell Apart In The Cloud
Products and Releases  |  8/27/2013  | 
When asked how much digital content in terms of photos, videos, documents and other files they have on their devices, women are less likely to know
Xceedium Extends Privileged Identity Management Protection To VMware vShield And vCloud
Products and Releases  |  8/27/2013  | 
Xsuite provides protection for both host systems running on the VMware hypervisor, and the vSphere and vCloud management consoles
Agiliance Adds BI Training Ror Its Risk Management Platform
Products and Releases  |  8/27/2013  | 
Column Technologies, on behalf of Agiliance, will provide virtual and on-premise Jaspersoft training services to Agiliance RiskVision customers
Bloxx Announces Secure Sockets Layer Intercept (SSLI) Software Development Kit For Security Solution Providers
Products and Releases  |  8/27/2013  | 
Aimed at security application developers seeking to add SSL traffic intercept capabilities to their Web content filtering, firewall, or UTM solutions.
Centrify Delivers Unified Identity Solution For Workplace Mac Users And Their Mobile Devices
Products and Releases  |  8/27/2013  | 
Centrify User Suite, Mac Edition integrates on-premise and remote Macs and mobile devices with Microsoft Active Directory
Check Point Launches Cloud Emulation Sandboxing Service To Tackle Zero-Day Attacks
Products and Releases  |  8/27/2013  | 
ThreatCloud Emulation cloud service is based on a global, companywide monthly quota of scanned files
HyTrust Raises $18.5 Million In Series C financing
Products and Releases  |  8/26/2013  | 
Funding from new investors Intel Capital, Fortinet, VMware, and In-Q-Tel, with participation by existing investors Granite Ventures, Cisco, Trident Capital, and Epic Ventures
Dell SecureWorks Warns Of Hacktivists Launching Multiprong Cyberattacks, Not Just DoS Attacks
Products and Releases  |  8/26/2013  | 
Hacktivists also launching SQLi and CSS attacks
WatchGuard Partners With NCP Engineering To Offer IPsec VPN Client For Microsoft Windows And Apple OS X Users
Products and Releases  |  8/23/2013  | 
VPN technology simplifies setup and enables one-click remote access for end users
ElcomSoft Speeds Up Phone Password Breaker, Enables Real-Time iCloud Recovery
Products and Releases  |  8/22/2013  | 
Forensic tool enables access to user data stored in Apple and BlackBerry mobile devices
U.S. Department of Homeland Security Awards HP Continuous Monitoring Services Contract
Products and Releases  |  8/22/2013  | 
One-year contract has a ceiling of $6 billion
CounterTack Partners With South Korean Providers For APT Defense
Products and Releases  |  8/22/2013  | 
CounterTack's endpoint protection platform, Sentinel, will play a critical role in countering the ongoing cyberattacks that threaten organizations in South Korea
Finjan Holdings Announces Reverse Stock Split
Products and Releases  |  8/21/2013  | 
12-for-1 reverse stock split of the company's common stock will be effective at the opening of trading on Thursday
SSH Appoints New Americas President And CEO
Products and Releases  |  8/21/2013  | 
Sami Ahvenniemi was most recently chairman of the SSH Communications Security board of directors
Mobile Banking Now 20% Of All Online Financial Transactions
Products and Releases  |  8/21/2013  | 
CEB TowerGroup will detail security risks that accompany rapid adoption of mobile banking in an upcoming webinar
GlobalSign Auto Enrollment Gateway Provides Automated Certificate Life Cycle Management For Microsoft Active Directory
Products and Releases  |  8/21/2013  | 
Solution automates enrollment, provisioning, and management of GlobalSign digital certificates for Windows environments
NCP Engineering Adds Ellipic Curve Crypto To Windows VPN Client And Gateway
Products and Releases  |  8/21/2013  | 
New versions designed to help enterprise customers yield higher level of security
Soldier Convicted Of Espionage Sentenced Today
Products and Releases  |  8/21/2013  | 
Pfc. Bradley E. Manning was found guilty of 20 offenses, including seven specifications of wrongful possession and transmission of national defense information
McAfee Quarterly Report Finds Increase In Mobile Threats
Products and Releases  |  8/21/2013  | 
Android-based malware achieves a 35 percent growth rate not seen since early 2012
New Citrix Worx App Gallery Provides Secure Mobile Apps
Products and Releases  |  8/21/2013  | 
Gallery has more than 100 committed third-party apps
Welsh, Carson, Anderson & Stowe To Acquire Alert Logic
Products and Releases  |  8/20/2013  | 
New funds will be used to accelerate growth through both geographic and product line expansion
Rapid7 Launches 2 New Security Products
Products and Releases  |  8/20/2013  | 
ControlsInsight and UserInsight focus on two core areas
Less Than Half Of IT Professionals Have Deployed Continuous Monitoring
Products and Releases  |  8/20/2013  | 
Study examined security controls and spending
CloudLock Adds Support For Google+, Enabling Large Enterprises To Apply CloudLock's Security And Audit Controls To Google+
Products and Releases  |  8/20/2013  | 
CloudLock's support for Google+ will help CIOs implement Google+ for their domain
Lookingglass And Ziften Partner To Deliver Threat Intelligence From The Internet To The Endpoint
Products and Releases  |  8/19/2013  | 
Combination of Lookingglass’ ability to monitor threats on the Internet and internal enterprise network with Ziften’s endpoint visibility provides end-to-end cyberthreat intelligence
Panda Security Launches 2014 Range With Multidevice Protection
Products and Releases  |  8/19/2013  | 
Panda Global Protection 2014 protects Windows, Mac, and Android
IBM Selected For DHS Cyber Initiative
Products and Releases  |  8/19/2013  | 
CDM Program moves the nation’s networks to a more real-time approach for the combat of advanced threats
Mobile Phone Using FPC Fingerprint Technology Launched By Fujitsu With DoCoMo
Products and Releases  |  8/19/2013  | 
Fujitsu F-07E Android smartphone has swipe sensor technology
NSA Creates Partnership With North Carolina State University
Products and Releases  |  8/19/2013  | 
Laboratory for Analytic Sciences to focus on big data problems
IBM To Acquire Trusteer
Products and Releases  |  8/19/2013  | 
New IBM Cybersecurity Software Lab in Israel will focus on mobile and application security, counterfraud, and malware detection
Newly Launched WebTitan Cloud, A Powerful Web Filtering Service For SMBs
Products and Releases  |  8/16/2013  | 
New cloud-based Web filtering service enables companies to monitor, control, and protect users online
VMware Announces Expanded Analytics For Log Insight
Products and Releases  |  8/16/2013  | 
Content packs enable VMware vCenter Log Insight to consume unstructured data from a wider variety of sources
Prosperoware Breaks New Ground In Managing Internal Data Security With Milan 3.0
Products and Releases  |  8/16/2013  | 
Milan 3.0 adds capability to manage information security across multiple systems on a "need to know" basis
PCI DSS 3.0 Change Highlights
Products and Releases  |  8/15/2013  | 
Version 3.0 to focus on flexibility, education and awareness, and security as a shared responsibility
CSC Offers GRC Solution As A Service
Products and Releases  |  8/14/2013  | 
CSC Horizon integrates data and reporting from existing cybersecurity controls into one view
Avira Launches Free Android Anti-Virus 2.0 For Smartphones And Tablets
Products and Releases  |  8/14/2013  | 
Free app offers antivirus scanning and removal
Fast Tracking AppSec Test Results - NT OBJECTives & Denim Group Partnership
Products and Releases  |  8/14/2013  | 
ThreadFix is now integrated with NTOSpider application scanner
Joomla Exploit Results In Thousands Of Infected Systems, Targeted Attacks Against EMEA Banks
Products and Releases  |  8/14/2013  | 
Versafe report summarizes the discovery of a vulnerability that had put Web sites hosted on the Joomla content management system at risk of being hijacked
Identity And Access Management (IAM) Market Worth $10.39 Billion By 2018
Products and Releases  |  8/14/2013  | 
Report identifies drivers and restraints for this market with insights on trends, opportunities, and challenges
CounterTack Awarded Patent Extension For Next-Generation Endpoint Security In New Global Markets
Products and Releases  |  8/13/2013  | 
Patent portfolio extended into Japan and Australia
Prolexic DDoS Protection Service Stops Attackers From Bringing Down 1ink.com e-Commerce Sites
Products and Releases  |  8/13/2013  | 
1ink.com is an online retailer of replacement inkjet and laser toner cartridges
Page 1 / 2   >   >>


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11771
PUBLISHED: 2018-08-16
When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream,...
CVE-2018-1715
PUBLISHED: 2018-08-16
IBM Maximo Asset Management 7.6 through 7.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 14700...
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.