Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in September 2010
Page 1 / 2   >   >>
PandaLabs Q3 Report: Trojans Constituted More Than Half of All New Threats; 95 Percent Of Email Was Spam
Products and Releases  |  9/30/2010  | 
In addition, targeted attacks on Android smartphones are on the rise
Modulo Announces Open Source SCAP For GRC
Products and Releases  |  9/30/2010  | 
Initiative aims to provide a common platform for collecting security data in order to automate policy compliance
CloudFlare And GlobalSign Team In Cloud Based SSL Security
Products and Releases  |  9/30/2010  | 
Partnership will allow CloudFlare’s customers to authenticate and secure Web applications via its cloud-based environment
Fortinet September Threat Landscape Report Shows PDF Vulnerability Used T Jailbreak iPhones
Products and Releases  |  9/30/2010  | 
“Broken” phones then susceptible to malware attacks
AVG Rolls Out AVG 2011 Enhanced Internet Security Software Suite
Products and Releases  |  9/30/2010  | 
AVG 2011 aimed at SMBs
TrustPort Changing Product Portfolio
Products and Releases  |  9/30/2010  | 
New product range comprises three security products
New "Aftercare" Service Provides Long-Term ID Repair To Victims Of ID Theft
Products and Releases  |  9/30/2010  | 
Debix will provide identity repair services at no additional charge
Dell KACE Kills The Evercookie
Products and Releases  |  9/30/2010  | 
Also set to announce PC Lockdown
PandaLabs Publishes Exclusive Interview With Hacker Group Behind Anti-Piracy Cyber Protest Attacks
Products and Releases  |  9/30/2010  | 
Q&A with leaders of "Anonymous" group responsible for the attacks on the Motion Picture Association of America and others available on the PandaLabs blog
eSoft, Inc. Announces Sale Of UTM Business Assets And Rebranding To zvelo
Products and Releases  |  9/29/2010  | 
zvelo is focused on providing SiteFilter offerings through OEM licensing partnerships
Trusted Computing Group Integrates TNC With SCAP
Products and Releases  |  9/29/2010  | 
SCAP-validated scanners can now be used with TNC network security gear to identify and quarantine unhealthy devices
Deloitte/NASCIO Survey: Government Data And Citizens' Personal Information At Risk
Products and Releases  |  9/29/2010  | 
Cybersecurity study finds that many CISOs lack means to adequately protect vital government data and the personal information of their constituents
Duke Researchers: Smartphone Apps Send Private Data Without Notification
Products and Releases  |  9/29/2010  | 
Notification came from TaintDroid, a prototype extension to the Android mobile-phone platform
October National Cyber Security Awareness Month About To Begin
Products and Releases  |  9/28/2010  | 
The month will kick off with three major events on the West and East coasts
Courion Offers Sun Customers Migration Option
Products and Releases  |  9/28/2010  | 
Sun Migration Program consists of four major elements
SenSage Announces New Round Of Funding
Products and Releases  |  9/28/2010  | 
Company has received $6.25M in combined capital
Sentrigo Joins Cloud Security Alliance
Products and Releases  |  9/28/2010  | 
Industry leaders unite to develop best practices for mitigating risk
Emerging Threats Launches Premium Version Of Open IDS Ruleset
Products and Releases  |  9/27/2010  | 
ET Pro is now available for Snort and Suricata
Georgia Tech And Mobile Active Defense Announce Innovation Alliance For Mobile Security
Products and Releases  |  9/27/2010  | 
Companies have completed their industry alliance partnership on mobile security research
Impulse Point Announces SafeConnect 5.0
Products and Releases  |  9/27/2010  | 
Safe.Connect 5.0 includes improved real-time policy reporting dashboard interface
Novell Releases New Governance Access Suite Version
Products and Releases  |  9/24/2010  | 
Novell Access Governance Suite version 4.1 includes Novell Access Request and Change Manage
GlobalSign Announces Unlimited Server Licensing Across SSL Certificate Product Range
Products and Releases  |  9/24/2010  | 
Change to core product DNA means SSL customers benefit from unlimited deployment potential and reduced SSL costs
Cisco AnyConnect Now An iPhone App
Products and Releases  |  9/24/2010  | 
Solution offers highly secure network connectivity from any Apple iOS 4.1 device
nCircle Survey: 89% Of Organizations Able to Implement Continuous Monitoring Program
Products and Releases  |  9/24/2010  | 
But 60% are not scanning for configuration compliance
Application Security, Inc. Delivers Automated Database Audits With AppDetectivePro 7
Products and Releases  |  9/23/2010  | 
AppDetectivePro 7 centralizes and automates existing audit procedures
White House Cyber Security Chief Applauds Free Cyber Safety Program For Schoolchildren
Products and Releases  |  9/23/2010  | 
The (ISC)2 Safe and Secure Online Program brings experts into schools to teach children ages 11-14 how to protect themselves in a cyber-connected world
Application Security, Inc. Adds Rights Management Functionality To DbProtect
Products and Releases  |  9/22/2010  | 
New module allows DBAs to automate user entitlement reviews in enterprise database environments
Application Security Inc. Forms Data Security Alliance
Products and Releases  |  9/22/2010  | 
Program designed to simplify integration between AppSec's DbProtect product line and complementary solutions
WebLOQ Expands Its Encrypted Email Service
Products and Releases  |  9/22/2010  | 
LOQMail 2.0 expands users' ability to communicate in a secure and compliant manner with non-LOQMail users
Phishers Still Favor Spam Over Social Networking Sites
Products and Releases  |  9/22/2010  | 
Three-quarters of IT managers say spam remains the greatest source of phishing threats in the workplace
Trend Micro Partners With Iconix To Deliver Visual ID For Email
Products and Releases  |  9/22/2010  | 
Service makes it easier to identify legitimate messages and avoid phishing attacks
ID TECH Taps Voltage Security For End-To-End Encryption
Products and Releases  |  9/21/2010  | 
ID TECH also announced it is joining the Voltage SecureData Open License Program
Softex Announces Data Protection Solution Self-Encrypting Drives
Products and Releases  |  9/21/2010  | 
SecureDrive take advantage of the full disk encryption security features of self-encrypting drives
MANDIANT Upgrades Memoryze Forensic Tool
Products and Releases  |  9/21/2010  | 
Memoryze will deliver faster processing speeds
Ping Identity Rolls Out PingFederate 6.3
Products and Releases  |  9/21/2010  | 
Single sign-on offering provides increased interoperability with Microsoft environments
Dataguise Teams With NetApp To Protect Data In Non-Production Environments
Products and Releases  |  9/21/2010  | 
Dataguise has joined the NetApp Alliance Partner Program as an Advantage Alliance Partner
Wombat Launches PhishGuru
Products and Releases  |  9/21/2010  | 
SaaS application provides training to users when implementing a penetration test or security assessment
Portcullis Adds App Accleration To UAG
Products and Releases  |  9/21/2010  | 
Ballista provides code optimization, compression and cache control for Web-based application traffic
Symantec Hosted Services Report Reveals Security Threats Of Increasingly Mobile Workforce
Products and Releases  |  9/21/2010  | 
One-third of distributed workforce exhibit potentially harmful Web browsing habits
Accuvant Acquires Ciphent
Products and Releases  |  9/21/2010  | 
Ciphent represents Accuvant's first acquisition
Mass Cyber Protests Target Recording Industry Association Of America And Motion Picture Association Of America
Products and Releases  |  9/20/2010  | 
4chan users launched denial-of-service attacks on the organizations in protest against attempts to shut down free file-sharing sites
Verifi Chargeback Service Helps Merchants Reclaim Lost Revenue On Disputed Charges
Products and Releases  |  9/20/2010  | 
Chargeback Representment Service will also be offered as a standalone offering
SafeNet/NetApp Enter Into Secure Storage Partnership
Products and Releases  |  9/20/2010  | 
Customers with the ability to manage and protect their on-premise, cloud-based and virtualized data storage
New Cloud Server Security Suite From CloudSigma
Products and Releases  |  9/20/2010  | 
Software designed to work in conjunction with its existing innovative Web console interface
Research breakthrough brings ubiquitous True Random Number Generators A Step Closer
Products and Releases  |  9/20/2010  | 
TRNGs are essential for IT security because virtually any security application relies on unpredictable numbers
IDF Rolls Out Secure Type-1 Hypervisor
Products and Releases  |  9/17/2010  | 
Secure hypervisor will enable secure virtualization technology for enterprises and government agencies
Logicworks Launches PCI Compliance Cloud Solution
Products and Releases  |  9/17/2010  | 
Company receives Level 1 Payment Card Industry (PCI) accreditation
SIA Endorses Biometrics In Federal E-Verify Program
Products and Releases  |  9/17/2010  | 
Technology can fix shortcomings in program, association says
IID Helps Monster.com, Credit Unions Join Internet Fraud Alert Program
Products and Releases  |  9/17/2010  | 
Internet Fraud Alert notifies organizations about fraudulent online activity involving their own stolen credentials
FireHost Now Lets Customers View And Control How They Use Their Secure Hosting Servers
Products and Releases  |  9/16/2010  | 
FireHost's customer portal gives visibility into critical server metrics
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.