From ‘O.MG’ to NSA, What Hardware Implants Mean for Security

Posted on February 15th, 2019 by Responsible Cyber

A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains. During a month-long hiatus between jobs, Mike Grover challenged himself to advance a project he’d been working on for over a year: Creating a USB cable capable of compromising […]

Read More

CrowdStrike Store opens its endpoint security agent to other vendors

Posted on February 15th, 2019 by Responsible Cyber

Cloud-based endpoint security company CrowdStrike has launched a new platform that allows other security vendors to use its own software agent to collect data. It’s a new model that, if successful, could disrupt the endpoint security space and could solve a problem that many organizations have: Being forced to install software agents from multiple vendors […]

Read More

What is phishing? How this cyber attack works and how to prevent it

Posted on February 15th, 2019 by Responsible Cyber

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download […]

Read More

Google Created Faster Storage Encryption for All Low-End Devices

Posted on February 14th, 2019 by Responsible Cyber

Google has launched a new encryption algorithm that has been built specifically to run on mobile phones and smart IoT devices that don’t have the specialized hardware to use current encryption methods to encrypt locally stored data efficiently.Encryption has already become an integral part of our everyday digital activities.However, it has long been known that […]

Read More

Disastrous cyber attack on email provider wipes US servers and backups

Posted on February 13th, 2019 by Responsible Cyber

Some cyber attacks are so disastrous that there’s no coming back from them. Email provider VFEmail worried that was the case when it said a hacker caused “catastrophic destruction” on Monday by destroying all data on U.S. servers, as well as the backup systems. On Monday morning, after VFEmail’s site, servers, and webmail client went […]

Read More

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

Posted on February 13th, 2019 by Responsible Cyber

What could be more frightening than a service informing you that all your data is gone—every file and every backup servers are entirely wiped out?The worst nightmare of its kind. Right?But that’s precisely what just happened this week with VFEmail.net, a US-based secure email provider that lost all data and backup files for its users […]

Read More

Blockchain and Trust – Schneier on Security

Posted on February 13th, 2019 by Responsible Cyber

Blockchain and TrustIn his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: “We have proposed a system for electronic transactions without relying on trust.” He was referring to blockchain, the system behind bitcoin cryptocurrency. The circumvention of trust is a great promise, but it’s just not true. Yes, bitcoin eliminates […]

Read More

Security firm beats Adobe by patching reader flaw first

Posted on February 13th, 2019 by Responsible Cyber

by Danny Bradbury Adobe has patched a flaw that enabled attackers to slurp a user’s network authentication details – but not before someone else patched it first. Security researcher Alex Inführ discovered a flaw in Adobe Reader which enabled a malicious PDF file to trigger a callback from the program. A compromised program would communicate […]

Read More

How to prevent and recover from an APT attack through a managed service provider

Posted on February 13th, 2019 by Responsible Cyber

What better way to enter a targeted system than through a firm that already has access to the targeted firm. The tactic is not new. In fact, attacking a target through its weakest link is a tried and true method. For this reason, managed service providers (MSPs), companies that are hired to manage the IT […]

Read More

Australia and Huawei: Why the ban?

Posted on February 12th, 2019 by Responsible Cyber

By now, you may have heard that Australia has excluded Huawei from the upcoming rollout of the nationwide 5G mobile infrastructure. The decision has made manufacturers, telecommunication experts, and politicians around the world stand up and take notice. Even some consumers, including those who use Huawei smartphones and tablets, wonder what this could mean for […]

Read More