Hackers Sell Access to Bait-and-Switch Empire — Krebs on Security

Posted on March 14th, 2019 by Responsible Cyber

Cybercriminals are auctioning off access to customer information stolen from an online data broker behind a dizzying array of bait-and-switch Web sites that sell access to a vast range of data on U.S. consumers, including DMV and arrest records, genealogy reports, phone number lookups and people searches. In an ironic twist, the marketing empire that […]

Read More

How to Stop Facebook App From Tracking Your Location In the Background

Posted on March 1st, 2019 by Responsible Cyber

Every app installed on your smartphone with permission to access location service “can” continually collect your real-time location secretly, even in the background when you do not use them.Do you know? — Installing the Facebook app on your Android and iOS smartphones automatically gives the social media company your rightful consent to collect the history […]

Read More

Hottest new cybersecurity products at RSA 2019

Posted on February 28th, 2019 by Responsible Cyber

Idaptive’s Next-Gen Access Cloud is designed to support an organization’s zero-trust approach identiy and access management (IAM). It verifies and validates people, devices and services while continuously learning from, and adapting to, millions of risk factors. Idaptive claims that Next-Gen Access Clous is the only solution combine single sign-on, adaptive multi-factor authentication, endpoint and mobile […]

Read More

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Posted on February 15th, 2019 by Responsible Cyber

You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security advice, and common sense, right?But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers?Security researchers at cybersecurity firm Check Point have […]

Read More

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Posted on February 6th, 2019 by Responsible Cyber

You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security advice, and common sense, right?But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers?Security researchers at cybersecurity firm Check Point have […]

Read More

iCloud Possibly Suffered A Privacy Breach Last Year That Apple Kept a Secret

Posted on February 1st, 2019 by Responsible Cyber

Late last year when an unknown group of hackers stole secret access tokens for millions of Facebook accounts by taking advantage of a flaw in its website, the company disclosed the incident and informed its affected users.Similarly, when Twitter was hit by multiple vulnerabilities (#1, #2, #3) in the last few months, the social media […]

Read More

It’s mop-up time for WebStresser DDoS-for-hire users

Posted on January 30th, 2019 by Responsible Cyber

by Lisa Vaas In April 2018, Dutch police inflicted a whole lot of “access denied” when they shut down Webstresser, the world’s biggest market for distributed-denial-of-service (DDoS) attacks. Law enforcement working in multiple countries nabbed at least four of the attack-for-hire site’s admins, and then they went knocking on the doors of its users. Some […]

Read More

Microsoft Exchange Vuln Enables Attackers to Gain Domain Admin Privileges

Posted on January 30th, 2019 by Responsible Cyber

Anyone with access to an Exchange mailbox can take control of domain, security researcher says. Microsoft Exchange 2013 and newer versions are vulnerable to a privilege escalation attack that gives anyone with a mailbox a way to gain domain administrator rights at potentially 90% of organizations running Active Directory and Exchange, according to a security […]

Read More

Remote Access & the Diminishing Security Perimeter

Posted on January 30th, 2019 by Responsible Cyber

Where security really matters, the enterprise is only as secure as the endpoints it allows to access its sensitive core systems. Long gone are the days of the physical perimeter, where a company’s IT infrastructure was entirely on-site. Today’s increasingly decentralized enterprises depend on a workforce that operates both at home and on mobile devices, […]

Read More