Products and Releases

Content posted in September 2010
Page 1 / 2   >   >>
PandaLabs Q3 Report: Trojans Constituted More Than Half of All New Threats; 95 Percent Of Email Was Spam
Products and Releases  |  9/30/2010  | 
In addition, targeted attacks on Android smartphones are on the rise
Modulo Announces Open Source SCAP For GRC
Products and Releases  |  9/30/2010  | 
Initiative aims to provide a common platform for collecting security data in order to automate policy compliance
CloudFlare And GlobalSign Team In Cloud Based SSL Security
Products and Releases  |  9/30/2010  | 
Partnership will allow CloudFlare’s customers to authenticate and secure Web applications via its cloud-based environment
Fortinet September Threat Landscape Report Shows PDF Vulnerability Used T Jailbreak iPhones
Products and Releases  |  9/30/2010  | 
“Broken” phones then susceptible to malware attacks
AVG Rolls Out AVG 2011 Enhanced Internet Security Software Suite
Products and Releases  |  9/30/2010  | 
AVG 2011 aimed at SMBs
TrustPort Changing Product Portfolio
Products and Releases  |  9/30/2010  | 
New product range comprises three security products
New "Aftercare" Service Provides Long-Term ID Repair To Victims Of ID Theft
Products and Releases  |  9/30/2010  | 
Debix will provide identity repair services at no additional charge
Dell KACE Kills The Evercookie
Products and Releases  |  9/30/2010  | 
Also set to announce PC Lockdown
PandaLabs Publishes Exclusive Interview With Hacker Group Behind Anti-Piracy Cyber Protest Attacks
Products and Releases  |  9/30/2010  | 
Q&A with leaders of "Anonymous" group responsible for the attacks on the Motion Picture Association of America and others available on the PandaLabs blog
eSoft, Inc. Announces Sale Of UTM Business Assets And Rebranding To zvelo
Products and Releases  |  9/29/2010  | 
zvelo is focused on providing SiteFilter offerings through OEM licensing partnerships
Trusted Computing Group Integrates TNC With SCAP
Products and Releases  |  9/29/2010  | 
SCAP-validated scanners can now be used with TNC network security gear to identify and quarantine unhealthy devices
Deloitte/NASCIO Survey: Government Data And Citizens' Personal Information At Risk
Products and Releases  |  9/29/2010  | 
Cybersecurity study finds that many CISOs lack means to adequately protect vital government data and the personal information of their constituents
Duke Researchers: Smartphone Apps Send Private Data Without Notification
Products and Releases  |  9/29/2010  | 
Notification came from TaintDroid, a prototype extension to the Android mobile-phone platform
October National Cyber Security Awareness Month About To Begin
Products and Releases  |  9/28/2010  | 
The month will kick off with three major events on the West and East coasts
Courion Offers Sun Customers Migration Option
Products and Releases  |  9/28/2010  | 
Sun Migration Program consists of four major elements
SenSage Announces New Round Of Funding
Products and Releases  |  9/28/2010  | 
Company has received $6.25M in combined capital
Sentrigo Joins Cloud Security Alliance
Products and Releases  |  9/28/2010  | 
Industry leaders unite to develop best practices for mitigating risk
Emerging Threats Launches Premium Version Of Open IDS Ruleset
Products and Releases  |  9/27/2010  | 
ET Pro is now available for Snort and Suricata
Georgia Tech And Mobile Active Defense Announce Innovation Alliance For Mobile Security
Products and Releases  |  9/27/2010  | 
Companies have completed their industry alliance partnership on mobile security research
Impulse Point Announces SafeConnect 5.0
Products and Releases  |  9/27/2010  | 
Safe.Connect 5.0 includes improved real-time policy reporting dashboard interface
Novell Releases New Governance Access Suite Version
Products and Releases  |  9/24/2010  | 
Novell Access Governance Suite version 4.1 includes Novell Access Request and Change Manage
GlobalSign Announces Unlimited Server Licensing Across SSL Certificate Product Range
Products and Releases  |  9/24/2010  | 
Change to core product DNA means SSL customers benefit from unlimited deployment potential and reduced SSL costs
Cisco AnyConnect Now An iPhone App
Products and Releases  |  9/24/2010  | 
Solution offers highly secure network connectivity from any Apple iOS 4.1 device
nCircle Survey: 89% Of Organizations Able to Implement Continuous Monitoring Program
Products and Releases  |  9/24/2010  | 
But 60% are not scanning for configuration compliance
Application Security, Inc. Delivers Automated Database Audits With AppDetectivePro 7
Products and Releases  |  9/23/2010  | 
AppDetectivePro 7 centralizes and automates existing audit procedures
White House Cyber Security Chief Applauds Free Cyber Safety Program For Schoolchildren
Products and Releases  |  9/23/2010  | 
The (ISC)2 Safe and Secure Online Program brings experts into schools to teach children ages 11-14 how to protect themselves in a cyber-connected world
Application Security, Inc. Adds Rights Management Functionality To DbProtect
Products and Releases  |  9/22/2010  | 
New module allows DBAs to automate user entitlement reviews in enterprise database environments
Application Security Inc. Forms Data Security Alliance
Products and Releases  |  9/22/2010  | 
Program designed to simplify integration between AppSec's DbProtect product line and complementary solutions
WebLOQ Expands Its Encrypted Email Service
Products and Releases  |  9/22/2010  | 
LOQMail 2.0 expands users' ability to communicate in a secure and compliant manner with non-LOQMail users
Phishers Still Favor Spam Over Social Networking Sites
Products and Releases  |  9/22/2010  | 
Three-quarters of IT managers say spam remains the greatest source of phishing threats in the workplace
Trend Micro Partners With Iconix To Deliver Visual ID For Email
Products and Releases  |  9/22/2010  | 
Service makes it easier to identify legitimate messages and avoid phishing attacks
ID TECH Taps Voltage Security For End-To-End Encryption
Products and Releases  |  9/21/2010  | 
ID TECH also announced it is joining the Voltage SecureData Open License Program
Softex Announces Data Protection Solution Self-Encrypting Drives
Products and Releases  |  9/21/2010  | 
SecureDrive take advantage of the full disk encryption security features of self-encrypting drives
MANDIANT Upgrades Memoryze Forensic Tool
Products and Releases  |  9/21/2010  | 
Memoryze will deliver faster processing speeds
Ping Identity Rolls Out PingFederate 6.3
Products and Releases  |  9/21/2010  | 
Single sign-on offering provides increased interoperability with Microsoft environments
Dataguise Teams With NetApp To Protect Data In Non-Production Environments
Products and Releases  |  9/21/2010  | 
Dataguise has joined the NetApp Alliance Partner Program as an Advantage Alliance Partner
Wombat Launches PhishGuru
Products and Releases  |  9/21/2010  | 
SaaS application provides training to users when implementing a penetration test or security assessment
Portcullis Adds App Accleration To UAG
Products and Releases  |  9/21/2010  | 
Ballista provides code optimization, compression and cache control for Web-based application traffic
Symantec Hosted Services Report Reveals Security Threats Of Increasingly Mobile Workforce
Products and Releases  |  9/21/2010  | 
One-third of distributed workforce exhibit potentially harmful Web browsing habits
Accuvant Acquires Ciphent
Products and Releases  |  9/21/2010  | 
Ciphent represents Accuvant's first acquisition
Mass Cyber Protests Target Recording Industry Association Of America And Motion Picture Association Of America
Products and Releases  |  9/20/2010  | 
4chan users launched denial-of-service attacks on the organizations in protest against attempts to shut down free file-sharing sites
Verifi Chargeback Service Helps Merchants Reclaim Lost Revenue On Disputed Charges
Products and Releases  |  9/20/2010  | 
Chargeback Representment Service will also be offered as a standalone offering
SafeNet/NetApp Enter Into Secure Storage Partnership
Products and Releases  |  9/20/2010  | 
Customers with the ability to manage and protect their on-premise, cloud-based and virtualized data storage
New Cloud Server Security Suite From CloudSigma
Products and Releases  |  9/20/2010  | 
Software designed to work in conjunction with its existing innovative Web console interface
Research breakthrough brings ubiquitous True Random Number Generators A Step Closer
Products and Releases  |  9/20/2010  | 
TRNGs are essential for IT security because virtually any security application relies on unpredictable numbers
IDF Rolls Out Secure Type-1 Hypervisor
Products and Releases  |  9/17/2010  | 
Secure hypervisor will enable secure virtualization technology for enterprises and government agencies
Logicworks Launches PCI Compliance Cloud Solution
Products and Releases  |  9/17/2010  | 
Company receives Level 1 Payment Card Industry (PCI) accreditation
SIA Endorses Biometrics In Federal E-Verify Program
Products and Releases  |  9/17/2010  | 
Technology can fix shortcomings in program, association says
IID Helps, Credit Unions Join Internet Fraud Alert Program
Products and Releases  |  9/17/2010  | 
Internet Fraud Alert notifies organizations about fraudulent online activity involving their own stolen credentials
FireHost Now Lets Customers View And Control How They Use Their Secure Hosting Servers
Products and Releases  |  9/16/2010  | 
FireHost's customer portal gives visibility into critical server metrics
Page 1 / 2   >   >>

SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/22/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I told him all that cryptomining would crash his system."
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.