Attacks/Breaches

In Brief: Using Offense To Create Best Defense

50%
50%

SPONSORED: Mike Viscuso, CTO of Carbon Black, and Ben Johnson, Chief Security Strategist of Carbon Black talk to Brian Gilloly at the RSA Conference about how their background in offensive security helps them think like attackers, and better defend against them. For the full interview, see here.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
androidblender
50%
50%
androidblender,
User Rank: Apprentice
2/10/2017 | 9:14:14 AM
Great
nice
markstone
50%
50%
markstone,
User Rank: Apprentice
7/20/2016 | 12:57:37 AM
Re: Pending Review
great post nice
geoasroy
50%
50%
geoasroy,
User Rank: Apprentice
7/13/2016 | 2:09:39 AM
Re: Pending Review
great one dis
Kylenmackey
50%
50%
Kylenmackey,
User Rank: Apprentice
7/10/2016 | 3:10:45 AM
Re: Pending Review
NICE POST DIS ONE
joelcarroll
50%
50%
joelcarroll,
User Rank: Apprentice
7/9/2016 | 7:12:56 AM
Re: Pending Review
GOOD POST NICE
Allen aldridge
50%
50%
Allen aldridge,
User Rank: Apprentice
7/5/2016 | 5:44:34 AM
Re: Pending Review
nice post dis
sangwanlal
50%
50%
sangwanlal,
User Rank: Apprentice
7/2/2016 | 2:39:49 AM
Re: Pending Review
great post
rambirsinghpal
50%
50%
rambirsinghpal,
User Rank: Apprentice
6/30/2016 | 4:04:15 AM
Re: Pending Review
like dis post
salvimorrisjal
50%
50%
salvimorrisjal,
User Rank: Apprentice
6/29/2016 | 5:48:03 PM
Re: Pending Review
GOOD NICE POST
shankarmak
50%
50%
shankarmak,
User Rank: Apprentice
6/24/2016 | 5:49:36 PM
Re: Pending Review
nice post dis
Page 1 / 3   >   >>
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.