Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products

Posted on February 15th, 2019 by Responsible Cyber

New initiative offers five principles for greater IoT security . Mozilla Foundation, the Internet Society, and eight other organizations have teamed up to push retailers to demand that Internet of Things manufacturers improve security in their devices. The initiative seeks to enlist retailers to use their greatest power — that of dropping products from distribution […]

Read More

From ‘O.MG’ to NSA, What Hardware Implants Mean for Security

Posted on February 15th, 2019 by Responsible Cyber

A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains. During a month-long hiatus between jobs, Mike Grover challenged himself to advance a project he’d been working on for over a year: Creating a USB cable capable of compromising […]

Read More

High Stress Levels Impacting CISOs Physically, Mentally

Posted on February 15th, 2019 by Responsible Cyber

Some have even turned to alcohol and medication as their demands outpace resources. A quarter of chief information security officers (CISOs) suffer from mental and health disorders as a result of tremendous and growing work pressures, a new survey shows. Contributing to the strain are concerns about job security, inadequate budget and resources, and a […]

Read More

Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale

Posted on February 15th, 2019 by Responsible Cyber

A hacker who was selling details of nearly 620 million online accounts stolen from 16 popular websites has now put up a second batch of 127 million records originating from 8 other sites for sale on the dark web.Last week, The Hacker News received an email from a Pakistani hacker who claims to have hacked […]

Read More

Android Phones Can Get Hacked Just by Looking at a PNG Image

Posted on February 15th, 2019 by Responsible Cyber

Using an Android device?Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile […]

Read More

Critical Zcash Bug Could Have Allowed ‘Infinite Counterfeit’ Cryptocurrency

Posted on February 15th, 2019 by Responsible Cyber

The developers behind the privacy-minded Zcash cryptocurrency have recently discovered and patched a highly dangerous vulnerability in the most secretive way that could have allowed an attacker to coin an infinite number of Zcash (ZEC).Yes, infinite… like a never-ending source of money.Launched in October 2016, Zcash is a privacy-oriented cryptocurrency that claims to be more […]

Read More

Toyota Prepping ‘PASTA’ for its GitHub Debut

Posted on February 15th, 2019 by Responsible Cyber

Carmaker’s open source car-hacking tool platform soon will be available to the research community. The lead developer behind Toyota’s new cybersecurity testing tool said the carmaker plans to make its so-called PASTA (Portable Automotive Security Testbed) available via GitHub as early as next month or April. Tsuyoshi Toyama, senior researcher at Toyota InfoTechnology Center, told […]

Read More

How to Delete Accidentally Sent Messages, Photos on Facebook Messenger

Posted on February 15th, 2019 by Responsible Cyber

Ever sent a message on Facebook Messenger then immediately regretted it, or an embarrassing text to your boss in the heat of the moment at late night, or maybe accidentally sent messages or photos to a wrong group chat?Of course, you have. We have all been through drunk texts and embarrassing photos many times that […]

Read More

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Posted on February 15th, 2019 by Responsible Cyber

You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security advice, and common sense, right?But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers?Security researchers at cybersecurity firm Check Point have […]

Read More

Valentine’s Emails Laced with Gandcrab Ransomware

Posted on February 15th, 2019 by Responsible Cyber

In the weeks leading up to Valentine’s Day 2019, researchers notice a new form of Gandcrab appearing in romance-themed emails. Hackers love the holidays, and Valentine’s Day is no exception. Some cybercriminals currently are spreading the love, with a new form of Gandcrab ransomware sliding into target inboxes. In the weeks preceding February 14, Mimecast […]

Read More