Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in August 2013
Page 1 / 2   >   >>
New Study Reveals Only 11% of Information Security Managers Trust Security Level Of Their Applications
Products and Releases  |  8/30/2013  | 
Quotium research shows large majority of security managers think their organizations' applications are still vulnerable to hacker attacks
Tenable Launches Security “App Store” For SecurityCenter 4.7
Products and Releases  |  8/29/2013  | 
SecurityCenter 4.7 will provide searchable catalog of apps that can be used to customize the dashboard
Social Networks: Can Robots Violate User Privacy?
Products and Releases  |  8/29/2013  | 
High-Tech Bridge experimented to verify how the 50 largest social networks, Web services, and free emails systems respect – or abuse - privacy of their users
HP Fortify Static Code Analyzer 4.0 Speeds Software Security Assessment By 10 Times
Products and Releases  |  8/29/2013  | 
New solution also reduces false positives by 20 percent over previous versions of the product
Finjan Holdings Subsidiary Files Patent Infringement Lawsuit Against Blue Coat Systems
Products and Releases  |  8/29/2013  | 
Finjan alleging infringement of patents relating to endpoint, Web, and network security technologies
StrikeForce Technologies Inc.'s GuardedID Keystroke Encryption Patent Granted
Products and Releases  |  8/28/2013  | 
GuardedID encrypts every keystroke typed on a keyboard
Small Business Authority's Survey Shows Overwhelming Majority of Independent Business Owners Believe Their Website Is Secure
Products and Releases  |  8/28/2013  | 
Findings from August survey is 86 percent of business owners feel that current website is secure
App Helps Secure Mobile Devices, Reports Security Status To Processor
Products and Releases  |  8/28/2013  | 
SecurityMetrics MobileScan includes acquirer/ISO access to a Merchant Compliance Console
Gateprotect Firewall Gets Hardware Boost
Products and Releases  |  8/28/2013  | 
GPO series has been equipped with the latest processors and more RAM
F-Secure Finds Women And Men Are Hard To Tell Apart In The Cloud
Products and Releases  |  8/27/2013  | 
When asked how much digital content in terms of photos, videos, documents and other files they have on their devices, women are less likely to know
Xceedium Extends Privileged Identity Management Protection To VMware vShield And vCloud
Products and Releases  |  8/27/2013  | 
Xsuite provides protection for both host systems running on the VMware hypervisor, and the vSphere and vCloud management consoles
Agiliance Adds BI Training Ror Its Risk Management Platform
Products and Releases  |  8/27/2013  | 
Column Technologies, on behalf of Agiliance, will provide virtual and on-premise Jaspersoft training services to Agiliance RiskVision customers
Bloxx Announces Secure Sockets Layer Intercept (SSLI) Software Development Kit For Security Solution Providers
Products and Releases  |  8/27/2013  | 
Aimed at security application developers seeking to add SSL traffic intercept capabilities to their Web content filtering, firewall, or UTM solutions.
Centrify Delivers Unified Identity Solution For Workplace Mac Users And Their Mobile Devices
Products and Releases  |  8/27/2013  | 
Centrify User Suite, Mac Edition integrates on-premise and remote Macs and mobile devices with Microsoft Active Directory
Check Point Launches Cloud Emulation Sandboxing Service To Tackle Zero-Day Attacks
Products and Releases  |  8/27/2013  | 
ThreatCloud Emulation cloud service is based on a global, companywide monthly quota of scanned files
HyTrust Raises $18.5 Million In Series C financing
Products and Releases  |  8/26/2013  | 
Funding from new investors Intel Capital, Fortinet, VMware, and In-Q-Tel, with participation by existing investors Granite Ventures, Cisco, Trident Capital, and Epic Ventures
Dell SecureWorks Warns Of Hacktivists Launching Multiprong Cyberattacks, Not Just DoS Attacks
Products and Releases  |  8/26/2013  | 
Hacktivists also launching SQLi and CSS attacks
WatchGuard Partners With NCP Engineering To Offer IPsec VPN Client For Microsoft Windows And Apple OS X Users
Products and Releases  |  8/23/2013  | 
VPN technology simplifies setup and enables one-click remote access for end users
ElcomSoft Speeds Up Phone Password Breaker, Enables Real-Time iCloud Recovery
Products and Releases  |  8/22/2013  | 
Forensic tool enables access to user data stored in Apple and BlackBerry mobile devices
U.S. Department of Homeland Security Awards HP Continuous Monitoring Services Contract
Products and Releases  |  8/22/2013  | 
One-year contract has a ceiling of $6 billion
CounterTack Partners With South Korean Providers For APT Defense
Products and Releases  |  8/22/2013  | 
CounterTack's endpoint protection platform, Sentinel, will play a critical role in countering the ongoing cyberattacks that threaten organizations in South Korea
Finjan Holdings Announces Reverse Stock Split
Products and Releases  |  8/21/2013  | 
12-for-1 reverse stock split of the company's common stock will be effective at the opening of trading on Thursday
SSH Appoints New Americas President And CEO
Products and Releases  |  8/21/2013  | 
Sami Ahvenniemi was most recently chairman of the SSH Communications Security board of directors
Mobile Banking Now 20% Of All Online Financial Transactions
Products and Releases  |  8/21/2013  | 
CEB TowerGroup will detail security risks that accompany rapid adoption of mobile banking in an upcoming webinar
GlobalSign Auto Enrollment Gateway Provides Automated Certificate Life Cycle Management For Microsoft Active Directory
Products and Releases  |  8/21/2013  | 
Solution automates enrollment, provisioning, and management of GlobalSign digital certificates for Windows environments
NCP Engineering Adds Ellipic Curve Crypto To Windows VPN Client And Gateway
Products and Releases  |  8/21/2013  | 
New versions designed to help enterprise customers yield higher level of security
Soldier Convicted Of Espionage Sentenced Today
Products and Releases  |  8/21/2013  | 
Pfc. Bradley E. Manning was found guilty of 20 offenses, including seven specifications of wrongful possession and transmission of national defense information
McAfee Quarterly Report Finds Increase In Mobile Threats
Products and Releases  |  8/21/2013  | 
Android-based malware achieves a 35 percent growth rate not seen since early 2012
New Citrix Worx App Gallery Provides Secure Mobile Apps
Products and Releases  |  8/21/2013  | 
Gallery has more than 100 committed third-party apps
Welsh, Carson, Anderson & Stowe To Acquire Alert Logic
Products and Releases  |  8/20/2013  | 
New funds will be used to accelerate growth through both geographic and product line expansion
Rapid7 Launches 2 New Security Products
Products and Releases  |  8/20/2013  | 
ControlsInsight and UserInsight focus on two core areas
Less Than Half Of IT Professionals Have Deployed Continuous Monitoring
Products and Releases  |  8/20/2013  | 
Study examined security controls and spending
CloudLock Adds Support For Google+, Enabling Large Enterprises To Apply CloudLock's Security And Audit Controls To Google+
Products and Releases  |  8/20/2013  | 
CloudLock's support for Google+ will help CIOs implement Google+ for their domain
Lookingglass And Ziften Partner To Deliver Threat Intelligence From The Internet To The Endpoint
Products and Releases  |  8/19/2013  | 
Combination of Lookingglass’ ability to monitor threats on the Internet and internal enterprise network with Ziften’s endpoint visibility provides end-to-end cyberthreat intelligence
Panda Security Launches 2014 Range With Multidevice Protection
Products and Releases  |  8/19/2013  | 
Panda Global Protection 2014 protects Windows, Mac, and Android
IBM Selected For DHS Cyber Initiative
Products and Releases  |  8/19/2013  | 
CDM Program moves the nation’s networks to a more real-time approach for the combat of advanced threats
Mobile Phone Using FPC Fingerprint Technology Launched By Fujitsu With DoCoMo
Products and Releases  |  8/19/2013  | 
Fujitsu F-07E Android smartphone has swipe sensor technology
NSA Creates Partnership With North Carolina State University
Products and Releases  |  8/19/2013  | 
Laboratory for Analytic Sciences to focus on big data problems
IBM To Acquire Trusteer
Products and Releases  |  8/19/2013  | 
New IBM Cybersecurity Software Lab in Israel will focus on mobile and application security, counterfraud, and malware detection
Newly Launched WebTitan Cloud, A Powerful Web Filtering Service For SMBs
Products and Releases  |  8/16/2013  | 
New cloud-based Web filtering service enables companies to monitor, control, and protect users online
VMware Announces Expanded Analytics For Log Insight
Products and Releases  |  8/16/2013  | 
Content packs enable VMware vCenter Log Insight to consume unstructured data from a wider variety of sources
Prosperoware Breaks New Ground In Managing Internal Data Security With Milan 3.0
Products and Releases  |  8/16/2013  | 
Milan 3.0 adds capability to manage information security across multiple systems on a "need to know" basis
PCI DSS 3.0 Change Highlights
Products and Releases  |  8/15/2013  | 
Version 3.0 to focus on flexibility, education and awareness, and security as a shared responsibility
CSC Offers GRC Solution As A Service
Products and Releases  |  8/14/2013  | 
CSC Horizon integrates data and reporting from existing cybersecurity controls into one view
Avira Launches Free Android Anti-Virus 2.0 For Smartphones And Tablets
Products and Releases  |  8/14/2013  | 
Free app offers antivirus scanning and removal
Fast Tracking AppSec Test Results - NT OBJECTives & Denim Group Partnership
Products and Releases  |  8/14/2013  | 
ThreadFix is now integrated with NTOSpider application scanner
Joomla Exploit Results In Thousands Of Infected Systems, Targeted Attacks Against EMEA Banks
Products and Releases  |  8/14/2013  | 
Versafe report summarizes the discovery of a vulnerability that had put Web sites hosted on the Joomla content management system at risk of being hijacked
Identity And Access Management (IAM) Market Worth $10.39 Billion By 2018
Products and Releases  |  8/14/2013  | 
Report identifies drivers and restraints for this market with insights on trends, opportunities, and challenges
CounterTack Awarded Patent Extension For Next-Generation Endpoint Security In New Global Markets
Products and Releases  |  8/13/2013  | 
Patent portfolio extended into Japan and Australia
Prolexic DDoS Protection Service Stops Attackers From Bringing Down 1ink.com e-Commerce Sites
Products and Releases  |  8/13/2013  | 
1ink.com is an online retailer of replacement inkjet and laser toner cartridges
Page 1 / 2   >   >>

COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.