How to automate Let’s Encrypt certificate authority in AWS using PowerShell

Posted on May 31st, 2019 by Responsible Cyber

If you have been in IT for the last few years, no doubt you will have heard of Let’s Encrypt, an open certificate authority. Its goal is simple: Ensure the internet is no longer transmitted in plaintext. To that end it issues digital certificates for free. The service is completely automated in the right circumstances, […]

Read More

Federal cybersecurity agency on the way?

Posted on May 31st, 2019 by Responsible Cyber

The departments and agencies within the United States government have evolved over time to address modern-day problems and meet the changing needs of citizens. For example, the Department of Homeland Security was created in the aftermath of the September 11th attacks as a measure to improve domestic safety and handle threats of terrorism. Jumping forward […]

Read More

Review: FireMon clears the clutter for network security policy management

Posted on May 31st, 2019 by Responsible Cyber

It’s kind of a paradox that as an organization’s network grows, they have to add more and more security appliances and programs to keep it safe, yet with increased complexity comes diminishing returns on those investments. What happens is that new security platforms implement new rules, which often conflict with or duplicate existing protections. And […]

Read More

Hackers Stole Customers’ Credit Cards from 103 Checkers and Rally’s Restaurants

Posted on May 31st, 2019 by Responsible Cyber

If you have swiped your payment card at the popular Checkers and Rally’s drive-through restaurant chains in past 2-3 years, you should immediately request your bank to block your card and notify it if you notice any suspicious transaction.Checkers, one of the largest drive-through restaurant chains in the United States, disclosed a massive long-running data […]

Read More

Top 5 Last-Minute Memorial Day Deals at THN Store → Get 60% Extra OFF

Posted on May 31st, 2019 by Responsible Cyber

Memorial Day has come and gone, but you still have time to land some of the best deals on some of the best apps and tech training bundles around.Whether you’re looking for a world-class VPN or want to begin a career as a high-paid ethical hacker or IT pro, this list of ultra-discounted apps and […]

Read More

Three tech-support scammers charged with ripping off the elderly

Posted on May 31st, 2019 by Responsible Cyber

by Lisa Vaas Three alleged tech-support scammers have been charged with bilking the elderly out of at least $1.3 million for tech support services they didn’t need and never got. The US Attorney’s Office for the Southern District of New York announced on Friday that the three had been arrested the day before. According to […]

Read More

Nearly 1 Million Computers Still Vulnerable to “Wormable” BlueKeep RDP Flaw

Posted on May 31st, 2019 by Responsible Cyber

Nearly 1 million Windows systems are still unpatched and have been found vulnerable to a recently disclosed critical, wormable, remote code execution vulnerability in the Windows Remote Desktop Protocol (RDP)—two weeks after Microsoft releases the security patch.If exploited, the vulnerability could allow an attacker to easily cause havoc around the world, potentially much worse than […]

Read More

Facial recognition used to strip adult industry workers of anonymity

Posted on May 31st, 2019 by Responsible Cyber

by Lisa Vaas As if we don’t already have enough facial-recognition dystopia, someone’s claiming to have used the technology to match the faces of porn actresses to social media profiles in order to “help others check whether their girlfriends ever acted in those films.” A Germany-based Chinese programmer said he and some friends have identified […]

Read More

Nine Charged in Alleged SIM Swapping Ring — Krebs on Security

Posted on May 23rd, 2019 by Responsible Cyber

Eight Americans and an Irishman have been charged with wire fraud this week for allegedly hijacking mobile phones through SIM-swapping, a form of fraud in which scammers bribe or trick employees at mobile phone stores into seizing control of the target’s phone number and diverting all texts and phone calls to the attacker’s mobile device. […]

Read More

Flaw Affecting Millions of Cisco Devices Let Attackers Implant Persistent Backdoor

Posted on May 23rd, 2019 by Responsible Cyber

Researchers have discovered a severe vulnerability in Cisco products that could allow attackers to implant persistent backdoor on wide range devices used in enterprises and government networks, including routers, switches, and firewalls.Dubbed Thrangrycat or 😾😾😾, the vulnerability, discovered by researchers from the security firm Red Balloon and identified as CVE-2019-1649, affects multiple Cisco products that […]

Read More