A hacker or your cloud provider. Who presents the greatest risk to your data?

Posted on April 6th, 2019 by Responsible Cyber

It’s your worst nightmare. All of your most important and sensitive data, the thing your business values most, the thing your company cannot operate without, the thing your regulators require you to protect, has been taken hostage. Your business grinds to a halt. Your customers and business partners are livid. Your regulators are demanding an […]

Read More

540 Million Facebook User Records Found On Unprotected Amazon Servers

Posted on April 6th, 2019 by Responsible Cyber

It’s been a bad week for Facebook users.First, the social media company was caught asking some of its new users to share passwords for their registered email accounts and now……the bad week gets worse with a new privacy breach.More than half a billion records of millions of Facebook users have been found exposed on unprotected […]

Read More

Microsoft Brings Defender Security Tools to Mac

Posted on March 24th, 2019 by Responsible Cyber

Windows Defender becomes Microsoft Defender, and it’s available in limited preview for Mac users. Microsoft is renaming its Windows Defender antivirus protection tool and bringing its security capabilities to macOS devices in a “limited preview” mode now available to businesses. Starting today, Microsoft Defender Advanced Threat Protection (ATP) will be available for Mac; with this […]

Read More

BitLocker hacked? Disk encryption – and why you still need it [VIDEO]

Posted on March 22nd, 2019 by Responsible Cyber

by Paul Ducklin A security researcher in New Zealand just showed that it’s possible to wire up a low-cost data sniffer to the security chip in a Microsoft Surface laptop… …and read out the decryption key used by BitLocker, the software that is there to keep the data on your hard disk safe. That has […]

Read More

5 Essentials for Securing and Managing Windows 10

Posted on March 14th, 2019 by Responsible Cyber

It’s possible to intelligently deploy and utilize Windows 10’s many security enhancements while avoiding common and costly migration pitfalls. With upward of 700 million devices running Windows 10, it’s the most rapidly adopted version of the operating system since Windows 95, proving the allure of its updated features, including security enhancements such as virtualization-based security, […]

Read More

Review: Bitglass manages the mobility monster

Posted on March 14th, 2019 by Responsible Cyber

It’s no secret that most businesses and organizations work better when they embrace mobility. The old formula of having droves of suited workers sitting at their desks from nine to five every day, typing away with desktop computers or even older technology simply doesn’t hold up in today’s always on, always connected world. Modern workers […]

Read More

Microsoft Releases Patches for 64 Flaws — Two Under Active Attack

Posted on March 14th, 2019 by Responsible Cyber

It’s time for another batch of “Patch Tuesday” updates from Microsoft.Microsoft today released its March 2019 software updates to address a total of 64 CVE-listed security vulnerabilities in its Windows operating systems and other products, 17 of which are rated critical, 45 important, one moderate and one low in severity.The update addresses flaws in Windows, […]

Read More

Latest WinRAR Flaw Being Exploited in the Wild to Hack Windows Computers

Posted on March 1st, 2019 by Responsible Cyber

It’s not just the critical Drupal vulnerability that is being exploited by in the wild cybercriminals to attack vulnerable websites that have not yet applied patches already available by its developers, but hackers are also exploiting a critical WinRAR vulnerability that was also revealed last week.A few days ago, The Hacker News reported about a 19-year-old […]

Read More

Attack Campaign Experiments with Rapid Changes in Email Lure Content

Posted on February 22nd, 2019 by Responsible Cyber

It’s like polymorphic behavior – only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content. A new email Trojan campaign spotted by security researchers has added another twist in evasive attacker behavior: Researchers with GreatHorn report that the waves of attacks they’ve observed since yesterday afternoon […]

Read More

Can you really sniff out gas station card skimmers with your phone?

Posted on February 20th, 2019 by Responsible Cyber

by Lisa Vaas There’s a “helpful tip” making the Facebook rounds, and it’s a little bit helpful but a lot not so much. It’s about using Bluetooth to detect credit card skimmers at gas stations: Here is a helpful tip:When you pull up to a gas station to fill your car. Search your phone for […]

Read More