Products and Releases

Content posted in September 2010
Page 1 / 2   >   >>
PandaLabs Q3 Report: Trojans Constituted More Than Half of All New Threats; 95 Percent Of Email Was Spam
Products and Releases  |  9/30/2010  | 
In addition, targeted attacks on Android smartphones are on the rise
Modulo Announces Open Source SCAP For GRC
Products and Releases  |  9/30/2010  | 
Initiative aims to provide a common platform for collecting security data in order to automate policy compliance
CloudFlare And GlobalSign Team In Cloud Based SSL Security
Products and Releases  |  9/30/2010  | 
Partnership will allow CloudFlare’s customers to authenticate and secure Web applications via its cloud-based environment
Fortinet September Threat Landscape Report Shows PDF Vulnerability Used T Jailbreak iPhones
Products and Releases  |  9/30/2010  | 
“Broken” phones then susceptible to malware attacks
AVG Rolls Out AVG 2011 Enhanced Internet Security Software Suite
Products and Releases  |  9/30/2010  | 
AVG 2011 aimed at SMBs
TrustPort Changing Product Portfolio
Products and Releases  |  9/30/2010  | 
New product range comprises three security products
New "Aftercare" Service Provides Long-Term ID Repair To Victims Of ID Theft
Products and Releases  |  9/30/2010  | 
Debix will provide identity repair services at no additional charge
Dell KACE Kills The Evercookie
Products and Releases  |  9/30/2010  | 
Also set to announce PC Lockdown
PandaLabs Publishes Exclusive Interview With Hacker Group Behind Anti-Piracy Cyber Protest Attacks
Products and Releases  |  9/30/2010  | 
Q&A with leaders of "Anonymous" group responsible for the attacks on the Motion Picture Association of America and others available on the PandaLabs blog
eSoft, Inc. Announces Sale Of UTM Business Assets And Rebranding To zvelo
Products and Releases  |  9/29/2010  | 
zvelo is focused on providing SiteFilter offerings through OEM licensing partnerships
Trusted Computing Group Integrates TNC With SCAP
Products and Releases  |  9/29/2010  | 
SCAP-validated scanners can now be used with TNC network security gear to identify and quarantine unhealthy devices
Deloitte/NASCIO Survey: Government Data And Citizens' Personal Information At Risk
Products and Releases  |  9/29/2010  | 
Cybersecurity study finds that many CISOs lack means to adequately protect vital government data and the personal information of their constituents
Duke Researchers: Smartphone Apps Send Private Data Without Notification
Products and Releases  |  9/29/2010  | 
Notification came from TaintDroid, a prototype extension to the Android mobile-phone platform
October National Cyber Security Awareness Month About To Begin
Products and Releases  |  9/28/2010  | 
The month will kick off with three major events on the West and East coasts
Courion Offers Sun Customers Migration Option
Products and Releases  |  9/28/2010  | 
Sun Migration Program consists of four major elements
SenSage Announces New Round Of Funding
Products and Releases  |  9/28/2010  | 
Company has received $6.25M in combined capital
Sentrigo Joins Cloud Security Alliance
Products and Releases  |  9/28/2010  | 
Industry leaders unite to develop best practices for mitigating risk
Emerging Threats Launches Premium Version Of Open IDS Ruleset
Products and Releases  |  9/27/2010  | 
ET Pro is now available for Snort and Suricata
Georgia Tech And Mobile Active Defense Announce Innovation Alliance For Mobile Security
Products and Releases  |  9/27/2010  | 
Companies have completed their industry alliance partnership on mobile security research
Impulse Point Announces SafeConnect 5.0
Products and Releases  |  9/27/2010  | 
Safe.Connect 5.0 includes improved real-time policy reporting dashboard interface
Novell Releases New Governance Access Suite Version
Products and Releases  |  9/24/2010  | 
Novell Access Governance Suite version 4.1 includes Novell Access Request and Change Manage
GlobalSign Announces Unlimited Server Licensing Across SSL Certificate Product Range
Products and Releases  |  9/24/2010  | 
Change to core product DNA means SSL customers benefit from unlimited deployment potential and reduced SSL costs
Cisco AnyConnect Now An iPhone App
Products and Releases  |  9/24/2010  | 
Solution offers highly secure network connectivity from any Apple iOS 4.1 device
nCircle Survey: 89% Of Organizations Able to Implement Continuous Monitoring Program
Products and Releases  |  9/24/2010  | 
But 60% are not scanning for configuration compliance
Application Security, Inc. Delivers Automated Database Audits With AppDetectivePro 7
Products and Releases  |  9/23/2010  | 
AppDetectivePro 7 centralizes and automates existing audit procedures
White House Cyber Security Chief Applauds Free Cyber Safety Program For Schoolchildren
Products and Releases  |  9/23/2010  | 
The (ISC)2 Safe and Secure Online Program brings experts into schools to teach children ages 11-14 how to protect themselves in a cyber-connected world
Application Security, Inc. Adds Rights Management Functionality To DbProtect
Products and Releases  |  9/22/2010  | 
New module allows DBAs to automate user entitlement reviews in enterprise database environments
Application Security Inc. Forms Data Security Alliance
Products and Releases  |  9/22/2010  | 
Program designed to simplify integration between AppSec's DbProtect product line and complementary solutions
WebLOQ Expands Its Encrypted Email Service
Products and Releases  |  9/22/2010  | 
LOQMail 2.0 expands users' ability to communicate in a secure and compliant manner with non-LOQMail users
Phishers Still Favor Spam Over Social Networking Sites
Products and Releases  |  9/22/2010  | 
Three-quarters of IT managers say spam remains the greatest source of phishing threats in the workplace
Trend Micro Partners With Iconix To Deliver Visual ID For Email
Products and Releases  |  9/22/2010  | 
Service makes it easier to identify legitimate messages and avoid phishing attacks
ID TECH Taps Voltage Security For End-To-End Encryption
Products and Releases  |  9/21/2010  | 
ID TECH also announced it is joining the Voltage SecureData Open License Program
Softex Announces Data Protection Solution Self-Encrypting Drives
Products and Releases  |  9/21/2010  | 
SecureDrive take advantage of the full disk encryption security features of self-encrypting drives
MANDIANT Upgrades Memoryze Forensic Tool
Products and Releases  |  9/21/2010  | 
Memoryze will deliver faster processing speeds
Ping Identity Rolls Out PingFederate 6.3
Products and Releases  |  9/21/2010  | 
Single sign-on offering provides increased interoperability with Microsoft environments
Dataguise Teams With NetApp To Protect Data In Non-Production Environments
Products and Releases  |  9/21/2010  | 
Dataguise has joined the NetApp Alliance Partner Program as an Advantage Alliance Partner
Wombat Launches PhishGuru
Products and Releases  |  9/21/2010  | 
SaaS application provides training to users when implementing a penetration test or security assessment
Portcullis Adds App Accleration To UAG
Products and Releases  |  9/21/2010  | 
Ballista provides code optimization, compression and cache control for Web-based application traffic
Symantec Hosted Services Report Reveals Security Threats Of Increasingly Mobile Workforce
Products and Releases  |  9/21/2010  | 
One-third of distributed workforce exhibit potentially harmful Web browsing habits
Accuvant Acquires Ciphent
Products and Releases  |  9/21/2010  | 
Ciphent represents Accuvant's first acquisition
Mass Cyber Protests Target Recording Industry Association Of America And Motion Picture Association Of America
Products and Releases  |  9/20/2010  | 
4chan users launched denial-of-service attacks on the organizations in protest against attempts to shut down free file-sharing sites
Verifi Chargeback Service Helps Merchants Reclaim Lost Revenue On Disputed Charges
Products and Releases  |  9/20/2010  | 
Chargeback Representment Service will also be offered as a standalone offering
SafeNet/NetApp Enter Into Secure Storage Partnership
Products and Releases  |  9/20/2010  | 
Customers with the ability to manage and protect their on-premise, cloud-based and virtualized data storage
New Cloud Server Security Suite From CloudSigma
Products and Releases  |  9/20/2010  | 
Software designed to work in conjunction with its existing innovative Web console interface
Research breakthrough brings ubiquitous True Random Number Generators A Step Closer
Products and Releases  |  9/20/2010  | 
TRNGs are essential for IT security because virtually any security application relies on unpredictable numbers
IDF Rolls Out Secure Type-1 Hypervisor
Products and Releases  |  9/17/2010  | 
Secure hypervisor will enable secure virtualization technology for enterprises and government agencies
Logicworks Launches PCI Compliance Cloud Solution
Products and Releases  |  9/17/2010  | 
Company receives Level 1 Payment Card Industry (PCI) accreditation
SIA Endorses Biometrics In Federal E-Verify Program
Products and Releases  |  9/17/2010  | 
Technology can fix shortcomings in program, association says
IID Helps Monster.com, Credit Unions Join Internet Fraud Alert Program
Products and Releases  |  9/17/2010  | 
Internet Fraud Alert notifies organizations about fraudulent online activity involving their own stolen credentials
FireHost Now Lets Customers View And Control How They Use Their Secure Hosting Servers
Products and Releases  |  9/16/2010  | 
FireHost's customer portal gives visibility into critical server metrics
Page 1 / 2   >   >>


High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.