Latest WinRAR Flaw Being Exploited in the Wild to Hack Windows Computers

Posted on March 1st, 2019 by Responsible Cyber

It’s not just the critical Drupal vulnerability that is being exploited by in the wild cybercriminals to attack vulnerable websites that have not yet applied patches already available by its developers, but hackers are also exploiting a critical WinRAR vulnerability that was also revealed last week.A few days ago, The Hacker News reported about a 19-year-old […]

Read More

Best security software, 2019: Lab-tested reviews of today’s top tools

Posted on February 28th, 2019 by Responsible Cyber

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror those trends, so companies get the most robust protection against the newest wave of threats. […]

Read More

IBM sets forth with a strong cybersecurity message

Posted on February 21st, 2019 by Responsible Cyber

I just got back from attending IBM Think in San Francisco. Though it was a quick trip across the country, I was inundated with IBM’s vision, covering topics from A (i.e. artificial intelligence) to Z (i.e. System Z) and everything in between. Despite the wide-ranging discussion, IBM’s main focus was on three areas: 1) hybrid […]

Read More

How to Hack Facebook Accounts? Just Ask Your Targets to Open a Link

Posted on February 20th, 2019 by Responsible Cyber

It’s 2019, and just clicking on a specially crafted URL would have allowed an attacker to hack your Facebook account without any further interaction.A security researcher discovered a critical cross-site request forgery (CSRF) vulnerability in the most popular social media platform that could have been allowed attackers to hijack Facebook accounts by simply tricking the […]

Read More

Addressing New Security Challenges with 5G

Posted on February 20th, 2019 by Responsible Cyber

Mobile network infrastructures have evolved dramatically over just a few short years. The evolution from 3G to 4G, for example, enabled the mobile infrastructure to deliver new data-centric services to consumer, such as rich multimedia, along with enhanced content capabilities and services. 5G will enhance the power and capacity of mobile networks to better support […]

Read More

19 Minutes to Escalation: Russian Hackers Move the Fastest

Posted on February 20th, 2019 by Responsible Cyber

New data from CrowdStrike’s incident investigations in 2018 uncover just how quickly nation-state hackers from Russia, North Korea, China, and Iran pivot from patient zero in a target organization. It takes Russian nation-state hackers just shy of 19 minutes to spread beyond their initial victims in an organization’s network – yet another sign of how […]

Read More

Kali Linux 2019.1 Released — Operating System For Hackers

Posted on February 20th, 2019 by Responsible Cyber

Wohooo! Great news for hackers and penetration testers.Offensive Security has just released Kali Linux 2019.1, the first 2019 version of its Swiss army knife for cybersecurity professionals.The latest version of Kali Linux operating system includes kernel up to version 4.19.13 and patches for numerous bugs, along with many updated software, like Metasploit, theHarvester, DBeaver, and […]

Read More

Apple App Store stuffed with hardcore porn and gambling apps

Posted on February 14th, 2019 by Responsible Cyber

by Lisa Vaas Apple’s easily abused Enterprise Certificate program isn’t just letting snoopy Facebook and Google apps slide into its Apps store, it turns out: It’s also being exploited by, at the very least, a dozen hardcore porn apps and a dozen gambling apps. Last week, Facebook’s Research app – that paid people, including teens, […]

Read More

Severe RCE Flaw Disclosed in Popular LibreOffice and OpenOffice Software

Posted on February 6th, 2019 by Responsible Cyber

It’s 2019, and just opening an innocent looking office document file on your system can still allow hackers to compromise your computer.No, I’m not talking about yet another vulnerability in Microsoft Office, but in two other most popular alternatives—LibreOffice and Apache OpenOffice—free, open source office software used by millions of Windows, MacOS and Linux users.Security […]

Read More

Major Zcash Vulnerability Fixed – Schneier on Security

Posted on February 6th, 2019 by Responsible Cyber

Major Zcash Vulnerability FixedZcash just fixed a vulnerability that would have allowed “infinite counterfeit” Zcash. Like all the other blockchain vulnerabilities and updates, this demonstrates the ridiculousness of the notion that code can replace people, that trust can be encompassed in the protocols, or that human governance is not ncessary. Tags: blockchain, cryptocurrency, patching, vulnerabilities […]

Read More