Comments
How Security Metrics Fail Us & How We Fail Them
Newest First  |  Oldest First  |  Threaded View
kate25
100%
0%
kate25,
User Rank: Apprentice
3/18/2018 | 12:59:31 PM
Re: Regarding the post
Thanks, windows10helpguide.

I need more information from you, but you share just a little bit. 

every time I am concern about that.we use much protection for it.but we failed sometimes.
windows10helpguide
50%
50%
windows10helpguide,
User Rank: Apprentice
3/14/2018 | 1:59:15 PM
Regarding the post
I have been influenced by this post very much. The attackers are increasing day by day attacking various systems online. The   windows 10 get help  is also there related to this problem. 
stonemaddox
0%
100%
stonemaddox,
User Rank: Guru
12/28/2017 | 5:46:07 AM
Security Metrics
Yeah, pretty bad, that you just can't fully rely on some security systems and companies, and metrics, but need to understand more by yourself and waste some time on that.
annamarsh
50%
50%
annamarsh,
User Rank: Apprentice
11/29/2017 | 8:45:41 AM
Info
nice post.
myxfinity
50%
50%
myxfinity,
User Rank: Apprentice
11/21/2017 | 5:55:56 AM
good work
now a days , security concerns a lot and it should never fail
nisabila50
50%
50%
nisabila50,
User Rank: Apprentice
10/10/2017 | 10:00:57 PM
rara
interesting and useful. thanks


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11771
PUBLISHED: 2018-08-16
When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream,...
CVE-2018-1715
PUBLISHED: 2018-08-16
IBM Maximo Asset Management 7.6 through 7.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 14700...
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.