Author

 Andrew Blaich, Security Researcher, Lookout

Profile of Andrew Blaich

Security Researcher, Lookout
News & Commentary Posts: 1
Andrew Blaich is a security researcher at Lookout where he is focused on the securing, responding, and defending of all things mobile. Prior to Lookout, Andrew was the Lead Security Analyst at Bluebox Security. He holds a Ph.D. in computer science, and engineering from the University of Notre Dame in enterprise security. In the past Andrew has worked at both Samsung and Qualcomm Research. Andrew was the head of research for Bluebox Labs and is a frequent presenter at security conferences including RSA.
6 Ways to Anger Attackers on Your Network
Kelly Sheridan, Staff Editor, Dark Reading,  12/26/2018
2018: The Year Machine Intelligence Arrived in Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/27/2018
Start Preparing Now for the Post-Quantum Future
Tim Hollobeek, Industry and Standards Technical Strategist at DigiCert,  12/28/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17191
PUBLISHED: 2018-12-31
Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configuration (PAC) interpretation is vulnerable for remote command execution (RCE). Using the nashorn script engine the environment of the javascript execution for the Proxy Auto-Configuration leaks privileged objects, that can be used to circumv...
CVE-2018-20617
PUBLISHED: 2018-12-31
ok-file-formats through 2018-10-16 has a heap-based buffer overflow in the ok_csv_decode2 function in ok_csv.c.
CVE-2018-20616
PUBLISHED: 2018-12-31
ok-file-formats through 2018-10-16 has a heap-based buffer overflow in the ok_wav_decode_ms_adpcm_data function in ok_wav.c.
CVE-2018-20613
PUBLISHED: 2018-12-30
TEMMOKU T1.09 Beta allows admin/user/add CSRF.
CVE-2018-20614
PUBLISHED: 2018-12-30
public\install\install.php in CIM 0.9.3 allows remote attackers to reload the product via the public/install/#/step3 URI.