Security Flaws in WPA3 Protocol Let Attackers Hack WiFi Password

Posted on April 13th, 2019 by Responsible Cyber

🔥 Breaking — It has been close to just one year since the launch of next-generation Wi-Fi security standard WPA3 and researchers have unveiled several serious vulnerabilities in the wireless security protocol that could allow attackers to recover the password of the Wi-Fi network.WPA, or Wi-Fi Protected Access, is a standard designed to authenticate wireless devices […]

Read More

The Modern Definition of Network Security

Posted on April 12th, 2019 by Responsible Cyber

When it comes to network security, the definition of those responsibilities has greatly evolved, just as the capabilities of networking have evolved. Think of the past environments you have worked in, going back as far as your token ring or dial-up days. Then fast forward to modern data centers, littered with fiber connections and traffic […]

Read More

Android phones transformed into anti-phishing security tokens

Posted on April 12th, 2019 by Responsible Cyber

by John E Dunn Google just announced a new security feature that allows users of Android 7 and later to use their smartphones to authenticate themselves to their Google accounts. The surprise announcement was buried inside a pile of enterprise-oriented enhancements revealed at Google Cloud Next 2019 in San Francisco on Wednesday. Released in beta, […]

Read More

Facebook password crisis – what to do? [VIDEO]

Posted on March 23rd, 2019 by Responsible Cyber

by Paul Ducklin Facebook has just admitted to years of problems with password hygiene by leaking plaintext passwords into logfiles by mistake. Watch this special edition of Naked Security Live… …we answer the questions lots of people have been asking us since we first wrote about this issue: What happened? Was this a blunder or […]

Read More

BitLocker hacked? Disk encryption – and why you still need it [VIDEO]

Posted on March 22nd, 2019 by Responsible Cyber

by Paul Ducklin A security researcher in New Zealand just showed that it’s possible to wire up a low-cost data sniffer to the security chip in a Microsoft Surface laptop… …and read out the decryption key used by BitLocker, the software that is there to keep the data on your hard disk safe. That has […]

Read More

On Surveillance in the Workplace

Posted on March 14th, 2019 by Responsible Cyber

Data & Society just published a report entitled “Workplace Monitoring & Surveillance”: This explainer highlights four broad trends in employee monitoring and surveillance technologies: Prediction and flagging tools that aim to predict characteristics or behaviors of employees or that are designed to identify or deter perceived rule-breaking or fraud. Touted as useful management tools, they […]

Read More

Latest WinRAR Flaw Being Exploited in the Wild to Hack Windows Computers

Posted on March 1st, 2019 by Responsible Cyber

It’s not just the critical Drupal vulnerability that is being exploited by in the wild cybercriminals to attack vulnerable websites that have not yet applied patches already available by its developers, but hackers are also exploiting a critical WinRAR vulnerability that was also revealed last week.A few days ago, The Hacker News reported about a 19-year-old […]

Read More

Best security software, 2019: Lab-tested reviews of today’s top tools

Posted on February 28th, 2019 by Responsible Cyber

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror those trends, so companies get the most robust protection against the newest wave of threats. […]

Read More

IBM sets forth with a strong cybersecurity message

Posted on February 21st, 2019 by Responsible Cyber

I just got back from attending IBM Think in San Francisco. Though it was a quick trip across the country, I was inundated with IBM’s vision, covering topics from A (i.e. artificial intelligence) to Z (i.e. System Z) and everything in between. Despite the wide-ranging discussion, IBM’s main focus was on three areas: 1) hybrid […]

Read More

How to Hack Facebook Accounts? Just Ask Your Targets to Open a Link

Posted on February 20th, 2019 by Responsible Cyber

It’s 2019, and just clicking on a specially crafted URL would have allowed an attacker to hack your Facebook account without any further interaction.A security researcher discovered a critical cross-site request forgery (CSRF) vulnerability in the most popular social media platform that could have been allowed attackers to hijack Facebook accounts by simply tricking the […]

Read More