Dark Reading Article Boards

Latest Message Boards
Page 1 / 2   >   >>
Instagram Hack: Hundreds Affected, Russia Suspected
Last Message: 8/16/2018
 |  Comments: 1
Name That Toon: Mobile Threat
Last Message: 8/15/2018
 |  Comments: 81
Open Source Software Poses a Real Security Threat
Last Message: 8/15/2018
 |  Comments: 1
Gartner Says IT Security Spending to Hit $124B in 2019
Last Message: 8/15/2018
 |  Comments: 1
Darknet: Where Your Stolen Identity Goes to Live
Last Message: 8/15/2018
 |  Comments: 4
The Fundamental Flaw in Security Awareness Programs
Last Message: 8/14/2018
 |  Comments: 4
8 Steps Toward Safer Elections
Last Message: 8/14/2018
 |  Comments: 5
Mobile Malware Incidents Hit 100% of Businesses
Last Message: 8/14/2018
 |  Comments: 6
Alexa Mishap Hints at Potential Enterprise Security Risk
Last Message: 8/14/2018
 |  Comments: 8
PGA of America Struck By Ransomware
Last Message: 8/13/2018
 |  Comments: 1
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Last Message: 8/13/2018
 |  Comments: 1
Name That Toon: Dark Reading Caption Contest
Last Message: 8/12/2018
 |  Comments: 5
Free endpoint scanning service powered by Open Threat Exchange
Last Message: 8/11/2018
 |  Comments: 2
How To Crash A Drone By Hacking Its 3D Propeller Design
Last Message: 8/11/2018
 |  Comments: 1
Mobile App Back-End Servers, Databases at Risk
Last Message: 8/10/2018
 |  Comments: 1
Mastering MITRE's ATT&CK Matrix
Last Message: 8/10/2018
 |  Comments: 3
Oh, No, Not Another Security Product
Last Message: 8/9/2018
 |  Comments: 1
Getting Safe, Smart & Secure on S3
Last Message: 8/8/2018
 |  Comments: 1
New Chrome Extension Alerts Users to Hacked Sites
Last Message: 8/8/2018
 |  Comments: 1
10 Tips for More Secure Mobile Devices
Last Message: 8/7/2018
 |  Comments: 3
Demystifying Mental Health in the Infosec Community
Last Message: 8/7/2018
 |  Comments: 2
Shadow IT: Every Company's 3 Hidden Security Risks
Last Message: 8/7/2018
 |  Comments: 1
Dept. of Energy to Test Electrical Grid Against Cyberattacks
Last Message: 8/7/2018
 |  Comments: 4
Tenable Prices IPO, Raises $250 Million
Last Message: 8/7/2018
 |  Comments: 1
Dark Reading News Desk Live at Black Hat USA 2018
Last Message: 8/7/2018
 |  Comments: 1
10 More Women in Security You May Not Know But Should
Last Message: 8/7/2018
 |  Comments: 1
Secure Wifi Hijacked by KRACK Vulns in WPA2
Last Message: 8/6/2018
 |  Comments: 3
Why Security Startups Fly And Why They Crash
Last Message: 8/6/2018
 |  Comments: 1
The ABCs of Hacking a Voting Machine
Last Message: 8/5/2018
 |  Comments: 1
"Hacking Higher Education"
Last Message: 8/5/2018
 |  Comments: 51
Imperva Plans to Purchase Prevoty
Last Message: 8/4/2018
 |  Comments: 1
Google Security Updates Include Titan Hardware Key
Last Message: 8/4/2018
 |  Comments: 8
4 Reasons Why Companies Are Failing at Incident Response
Last Message: 8/3/2018
 |  Comments: 1
HP Launches Printer Bug Bounty Program
Last Message: 8/3/2018
 |  Comments: 1
Consumers Rank Security High in Payment Decisions
Last Message: 8/3/2018
 |  Comments: 2
65% of Resold Memory Cards Still Pack Personal Data
Last Message: 8/3/2018
 |  Comments: 2
Free New Scanner Aims to Protect Home Networks
Last Message: 8/2/2018
 |  Comments: 2
Yale Discloses Data Breach
Last Message: 8/2/2018
 |  Comments: 1
Cryptocurrency Theft Drives 3x Increase in Money Laundering
Last Message: 8/2/2018
 |  Comments: 2
Every Week Is Shark Week in Cyberspace
Last Message: 8/2/2018
 |  Comments: 7
Page 1 / 2   >   >>


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.