Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in September 2013
Page 1 / 3   >   >>
Vulnerability To Phishing Scams May Be Linked To Personality, NYU-Poly Study Shows
Products and Releases  |  9/30/2013  | 
Two factors may boost the likelihood that a computer user will fall prey
NTT Com Security Survey Reveals Mature Cloud Adopters Consider Cloud More Secure, Cost-Effective And Flexible Than Data Center Deployment
Products and Releases  |  9/30/2013  | 
Different levels at which businesses are embrace cloud computing reflects a disparity between board-level discussions
Fingerprint Cards Purchases Key Wireless Patents
Products and Releases  |  9/30/2013  | 
Patent portfolio consisting of more than 100 granted patents
Experian Data Breach Resolution Reveals Five Common Mistakes Made When Handling A Breach
Products and Releases  |  9/30/2013  | 
In recognition of National Cyber Security Awareness Month, the list identifies missteps that may put organizations at greater risk for reputational, financial, and legal damage
FireHost Announces The Payment Island Simplifies PCI Compliance and Boosts Security For Online Payments Processing Businesses
Products and Releases  |  9/27/2013  | 
Payment Island essentially provides a data vault for businesses that process transactions in the cloud
PCI Community Prepares For New Standards Release
Products and Releases  |  9/27/2013  | 
Annual meeting draws more than 1300 to discuss PCI DSS 3.0, EMV chip, mobile
NQ Mobile Security Center Eradicates Three New Malware Strains Infecting Thousands In China
Products and Releases  |  9/27/2013  | 
Three quarantined malware threats used SMS messages to deliver their malicious payloads
Nexgate Releases First-Ever Global Social Spam List; Publishes Report On Social Spam
Products and Releases  |  9/26/2013  | 
New social spam list correlates spam from across social networks into one global block list to protect enterprise brand
Cloud Security Corporation Corporate Update
Products and Releases  |  9/26/2013  | 
Company has consolidated its business operations
Verio And StopTheHacker Team To Offer SMBs Free Website Security Reports
Products and Releases  |  9/26/2013  | 
Verio aims to increase website security awareness among small businesses
CloudPassage Extends Cloud Infrastructure Security To Large Enterprises
Products and Releases  |  9/26/2013  | 
Halo Enterprise is a security-as-a-service solution built for large-scale, heterogeneous cloud infrastructure environments
CyberArk Unveils Master Policy; Revolutionary Approach to Privileged Account Security Turns Business Policy Into Global Controls
Products and Releases  |  9/26/2013  | 
In addition to Master Policy, CyberArk’s version 8.0 includes the Universal Connector
NQ Mobile Announces Preload Deals For Mobile Security Solutions On Huawei, ZTE And Lenovo Smartphones
Products and Releases  |  9/26/2013  | 
NQ Mobile Security detects and deletes viruses, malicious URLs, and other threats
Survey: Analytics And Intelligence Being Used But Not Effectively
Products and Releases  |  9/26/2013  | 
SANS survey shows only 10 percent of respondents felt confident in their organizations' ability to analyze large data sets for security trends
22 Hours: Average Time It Takes Malware Distributors To Exploit News Events
Products and Releases  |  9/26/2013  | 
E-mail security provider Eleven sees instances of criminals inventing "breaking news" that appears to relate to high-profile current event
IT Pros' Biggest Nightmare
Products and Releases  |  9/25/2013  | 
EiQ Networks survey findings reveal concerns over compliance burdens
New Onapsis X1 Streamlines Compliance For SOX And NERC Mandates Affecting SAP Customers
Products and Releases  |  9/25/2013  | 
New version shortens external audit time and prevents audit failures
Cloud Adoption And Risk Report Reveals Organizations Are Flying Blind As They Embrace Cloud Services
Products and Releases  |  9/25/2013  | 
Report reveals that organizations lack the information to understand and mitigate a broader set of risks posed by the use of cloud services
CSA Releases New Big Data Report
Products and Releases  |  9/25/2013  | 
Report details how the landscape of security analytics is changing
OWASP Foundation: New York Times CTO; Senior Executives from HP, Oracle, Bloomberg LP Among Confirmed Speakers For AppSec USA
Products and Releases  |  9/25/2013  | 
Conference will be held Nov. 18 to 21 in New York City
Econet.Com Signs OEM Agreement With Emerging Threats
Products and Releases  |  9/25/2013  | 
ETPro Ruleset will run on the Sentinel IPS proprietary engine
SpectorSoft Provides Comprehensive Insider Threat Detection And Early Warning Solution That Protects Employee Privacy
Products and Releases  |  9/25/2013  | 
Spector 360 Recon alerts organizations when policy violations, fraud, data theft, and illegal and inappropriate activities are taking place
DigiCert Announces Certificate Transparency Support
Products and Releases  |  9/24/2013  | 
DigiCert will begin adding SSL Certificates to a public CT log by the end of October
General Dynamics Fidelis Cybersecurity Solutions Increases Real-Time Malware Prevention With Unique Application Of YARA Technology
Products and Releases  |  9/24/2013  | 
YARA technology is a rule-based malware identification and classification tool
Finjan Holdings Subsidiary Files Patent Infringement Lawsuit Against Websense
Products and Releases  |  9/24/2013  | 
Complaint alleges that Websense's products and services infringe on four of Finjan's patents
Fiberlink Data Suggests Simple Passcodes Rule The Mobile Security Landscape
Products and Releases  |  9/24/2013  | 
User data reveals PIN is in, with 93 percent of devices employing basic passcode
Unisys Survey Finds Majority Of Business Leaders Concerned About Threats To Data And Infrastructure
Products and Releases  |  9/24/2013  | 
Business leaders also perceive multiple security threats to their data and IT infrastructures
Survey Shows Majority Of Tech Executives Planning For Cybersecurity Attacks
Products and Releases  |  9/24/2013  | 
Only one-third of technology and health care companies are completely confident in the security of their information
AVAST Acquires Jumpshot
Products and Releases  |  9/24/2013  | 
AVAST will integrate and make Jumpshot's technology available to its users by end of year
Cisco Delivers Safety And Security Solution Innovations/Enhancements
Products and Releases  |  9/24/2013  | 
Adds video surveillance architectures and new IoT enabled solutions
Website Security Company Sucuri Inc. Acquires Unmask Parasites Security Service
Products and Releases  |  9/23/2013  | 
Denis Sinegubko, founder of Unmask Parasites, will be joining the company's research team
Huawei Announces An Integrated Data Integrity Solution In Collaboration With Emulex And Oracle
Products and Releases  |  9/23/2013  | 
Solution can help customers prevent silent data corruption in mission-critical services
Lancope Appoints Tim (TK) Keanini As CTO
Products and Releases  |  9/23/2013  | 
Most recently, Keanini served as CTO of nCircle Network Security
BT Launches Virtual Chief Security Officer Service In The U.S. For End-To-End Enterprise Security
Products and Releases  |  9/23/2013  | 
vCSO is a managed service that provides development, management, and operation of an enterprise information security team
Interop New York Sponsors & Exhibitors Launch New Products & Services
Products and Releases  |  9/23/2013  | 
These sponsors and vendors will join 120 exhibitors on the Expo show floor
Route1 Receives U.S. DHS Order For 7,000 MobiKEY Fusion Devices
Products and Releases  |  9/23/2013  | 
DHS will be replacing its allotment of MobiKEY Classic devices with Route1's MobiKEY Fusion device
Federal Cybersecurity Professionals To Leadership: We Can Do Better
Products and Releases  |  9/23/2013  | 
MeriTalk report examines state of cybersecurity at federal agencies
FireEye Goes Public
Products and Releases  |  9/20/2013  | 
Trading begins today
Black Hat To Launch First Regional Summit In Brazil
Products and Releases  |  9/19/2013  | 
Two-day event will be co-located with IT Forum Expo
Tripwire Announces Expanded IPv6 Support In IP360
Products and Releases  |  9/19/2013  | 
Version 7.2 featuring support for IPv6 vulnerability scanning, expanded integration services, and additional SCAP functionality
Prolexic Shares Best Practices for Protecting E-Commerce Sites Against Q4 DDoS Attacks
Products and Releases  |  9/19/2013  | 
White paper addresses escalating cyberthreats targeting e-commerce sites
Trend Micro Announces New HQ In Texas
Products and Releases  |  9/19/2013  | 
Announcement also coincides with company’s 25th anniversary
Toopher Partners With LastPass
Products and Releases  |  9/19/2013  | 
LastPass now supports multifactor authentication with Toopher
NIST Awards Grants To Improve Online Security And Privacy
Products and Releases  |  9/19/2013  | 
Funding will enable five U.S. organizations to develop pilot identity protection and verification systems
Zscaler Announces Cloud-Based APT Solution
Products and Releases  |  9/19/2013  | 
Zscaler for APTs delivers real-time protection from potentially malicious code
iovation Finds 30 Percent Of Transactions Conducted From Tor Are Fraudulent
Products and Releases  |  9/19/2013  | 
Company also announced general availability of a new capability for its flagship Reputation Manager 360 service
Interim Report: Top Cyberthreats
Products and Releases  |  9/19/2013  | 
Includes smarter targeted attacks, mobile threats, and social media identity thefts by cybercriminals using cloud services
(ISC)2 Announces 2013 U.S. Government Information Security Leadership Award Finalists
Products and Releases  |  9/19/2013  | 
GISLA program was established in 2004 to spotlight federal information security leaders who are modeling excellence and achieving clear results
Centrify Backs BYOD Initiates With Day One Support And Interoperability Of Apple iOS 7 Operating System
Products and Releases  |  9/18/2013  | 
Centrify User Suite solution offers centralized access management and reporting of enrolled devices and installed applications
BlackBerry Announces Z30 Smartphone With BlackBerry OS Version 10.2
Products and Releases  |  9/18/2013  | 
All-touch smartphone rounds out the BlackBerry 10 portfolio
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file