Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

9/5/2018
08:00 PM
100%
0%

7 Ways Blockchain is Being Used for Security

Blockchain is being used as a security tool. If you haven't thought about adopting it, you might want to reconsider your take.
Previous
1 of 8
Next

The distributed ledger of blockchain has found application in many fields, from cryptocurrency to supply chain. Much of the excitement about blockchain is due to its reputation as an inherently secure technology. But can that inherent security be applied to the field of security itself?

In a growing number of cases, the answer is "yes." Security professionals are finding that the qualities blockchain brings to a solution are effective in securing data, networks, identities, critical infrastructure, and more. As with other emerging technologies, the biggest question is not seen as whether blockchain can be used in security, but in which applications it is best used today.

Blockchain is being used in a number of security applications, ranging from record-keeping to acting as part of the active data infrastructure, and more options likely are on the horizon.

But while excitement over blockchain's potential grows, it's important to keep that potential in perspective.

One of the claims frequently made about blockchain is that it is an "un-hackable" technology. While no intrusive hacks have been demonstrated yet, it's wrong to say that blockchain can't be hacked. In early 2018, a "51% attack", in which a threat actor managed to gain control over more than half of a blockchain's compute power and corrupt the integrity of the ledger, showed that novel techniques can be effective. While this particular attack is expensive and difficult, the fact that it was effective means that security professionals should treat blockchain as a useful technology - not a magical answer to all problems.

Here are some ways blockchain is being used or considered as a security tool. 

(Image: NicoElNino)

 

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Jesussavesme@1
50%
50%
[email protected],
User Rank: Apprentice
11/6/2018 | 12:16:34 AM
Helpful article
Thanks for your article .really helpms me a lot

https://socialprachar.com/31-10-18-what-is-blockchain-technology/?ref=sudheer
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17612
PUBLISHED: 2019-10-15
An issue was discovered in 74CMS v5.2.8. There is a SQL Injection generated by the _list method in the Common/Controller/BackendController.class.php file via the index.php?m=Admin&c=Ad&a=category sort parameter.
CVE-2019-17613
PUBLISHED: 2019-10-15
qibosoft 7 allows remote code execution because do/jf.php makes eval calls. The attacker can use the Point Introduction Management feature to supply PHP code to be evaluated. Alternatively, the attacker can access admin/index.php?lfj=jfadmin&action=addjf via CSRF, as demonstrated by a payload in...
CVE-2019-17395
PUBLISHED: 2019-10-15
In the Rapid Gator application 0.7.1 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-17602
PUBLISHED: 2019-10-15
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
CVE-2019-17394
PUBLISHED: 2019-10-15
In the Seesaw Parent and Family application 6.2.5 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.