Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale

Posted on February 15th, 2019 by Responsible Cyber

A hacker who was selling details of nearly 620 million online accounts stolen from 16 popular websites has now put up a second batch of 127 million records originating from 8 other sites for sale on the dark web.Last week, The Hacker News received an email from a Pakistani hacker who claims to have hacked […]

Read More

Android phones can be hacked remotely by viewing malicious PNG image

Posted on February 14th, 2019 by Responsible Cyber

Your Android could be pwned by simply viewing an innocent-looking image – be it from browsing the internet or an image received via text – according to the Android Security Bulletin issued this month. While this certainly doesn’t apply to all images, Google discovered that a maliciously crafted PNG image could be used to hijack […]

Read More

Snapd Flaw Lets Attackers Gain Root Access On Linux Systems

Posted on February 14th, 2019 by Responsible Cyber

Ubuntu and some other Linux distributions suffer from a severe privilege escalation vulnerability that could allow a local attacker or a malicious program to obtain root privileges and total control over the targeted system.Dubbed “Dirty_Sock” and identified as CVE-2019-7304, the vulnerability was discovered by security researcher Chris Moberly, who privately disclosed it to Canonical, the […]

Read More

Google paid out $3.4m in bug bounties last year

Posted on February 14th, 2019 by Responsible Cyber

by Lisa Vaas A 19-year-old researcher from Uruguay; a restaurant owner from Cluj, Romania; and a Cambridge professor: these are just three of the 317 researchers who were rewarded for reporting vulnerabilities and helping keep Google users safer in 2018, the company said in its yearly bug bounty payout wrap-up. Google awarded a total of […]

Read More

Disastrous cyber attack on email provider wipes US servers and backups

Posted on February 13th, 2019 by Responsible Cyber

Some cyber attacks are so disastrous that there’s no coming back from them. Email provider VFEmail worried that was the case when it said a hacker caused “catastrophic destruction” on Monday by destroying all data on U.S. servers, as well as the backup systems. On Monday morning, after VFEmail’s site, servers, and webmail client went […]

Read More

Cybersecurity and the Human Element: We’re All Fallible

Posted on February 13th, 2019 by Responsible Cyber

We examine the issue of fallibility from six sides: end users, security leaders, security analysts, IT security administrators, programmers, and attackers. First of a six-part series. We are only human; we all make mistakes sometimes. Until the day when both the offensive and defensive sides of cyberattacks are conducted entirely by machines, we need to […]

Read More

‘Picnic’ Passes Test for Protecting IoT From Quantum Hacks

Posted on February 13th, 2019 by Responsible Cyber

Researchers from DigiCert, Utimaco, and Microsoft Research gives thumbs-up to a new algorithm for implementing quantum hacking-proof digital certificates. Researchers at DigiCert, Utimaco, and Microsoft Research this week announced the successful test of a newly created algorithm named “Picnic,” with digital certificates used to encrypt, authenticate, and provide integrity for Internet of Things (IoT) devices. The […]

Read More

Australia and Huawei: Why the ban?

Posted on February 12th, 2019 by Responsible Cyber

By now, you may have heard that Australia has excluded Huawei from the upcoming rollout of the nationwide 5G mobile infrastructure. The decision has made manufacturers, telecommunication experts, and politicians around the world stand up and take notice. Even some consumers, including those who use Huawei smartphones and tablets, wonder what this could mean for […]

Read More

How ADP identifies and reduces third-party risk

Posted on February 6th, 2019 by Responsible Cyber

Today’s modern enterprise is far from a self-contained monolith, but rather the center of a vast web of interconnected suppliers, vendors and customers, all of which introduce risk for a CISO to deal with. Managing that risk is by no means a solved problem, but CSO50 winner ADP’s new Global Third-Party Risk Management framework has […]

Read More

Just two hacker groups are behind 60% of stolen cryptocurrency

Posted on February 6th, 2019 by Responsible Cyber

by Danny Bradbury We may not know the names of those who steal cryptocurrency from online exchanges, but we now know that most of the thefts are down to just two groups – and one of them isn’t even in it for the money alone. A new report from blockchain investigation company Chainalysis reveals that […]

Read More