From ‘O.MG’ to NSA, What Hardware Implants Mean for Security
Posted on February 15th, 2019 by Responsible Cyber
A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains. During a month-long hiatus between jobs, Mike Grover challenged himself to advance a project he’d been working on for over a year: Creating a USB cable capable of compromising […]
Read MoreCrowdStrike Store opens its endpoint security agent to other vendors
Posted on February 15th, 2019 by Responsible Cyber
Cloud-based endpoint security company CrowdStrike has launched a new platform that allows other security vendors to use its own software agent to collect data. It’s a new model that, if successful, could disrupt the endpoint security space and could solve a problem that many organizations have: Being forced to install software agents from multiple vendors […]
Read MoreWhat is phishing? How this cyber attack works and how to prevent it
Posted on February 15th, 2019 by Responsible Cyber
Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download […]
Read MoreGoogle Created Faster Storage Encryption for All Low-End Devices
Posted on February 14th, 2019 by Responsible Cyber
Google has launched a new encryption algorithm that has been built specifically to run on mobile phones and smart IoT devices that don’t have the specialized hardware to use current encryption methods to encrypt locally stored data efficiently.Encryption has already become an integral part of our everyday digital activities.However, it has long been known that […]
Read MoreDisastrous cyber attack on email provider wipes US servers and backups
Posted on February 13th, 2019 by Responsible Cyber
Some cyber attacks are so disastrous that there’s no coming back from them. Email provider VFEmail worried that was the case when it said a hacker caused “catastrophic destruction” on Monday by destroying all data on U.S. servers, as well as the backup systems. On Monday morning, after VFEmail’s site, servers, and webmail client went […]
Read MoreHackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups
Posted on February 13th, 2019 by Responsible Cyber
What could be more frightening than a service informing you that all your data is gone—every file and every backup servers are entirely wiped out?The worst nightmare of its kind. Right?But that’s precisely what just happened this week with VFEmail.net, a US-based secure email provider that lost all data and backup files for its users […]
Read MoreBlockchain and Trust – Schneier on Security
Posted on February 13th, 2019 by Responsible Cyber
Blockchain and TrustIn his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: “We have proposed a system for electronic transactions without relying on trust.” He was referring to blockchain, the system behind bitcoin cryptocurrency. The circumvention of trust is a great promise, but it’s just not true. Yes, bitcoin eliminates […]
Read MoreSecurity firm beats Adobe by patching reader flaw first
Posted on February 13th, 2019 by Responsible Cyber
by Danny Bradbury Adobe has patched a flaw that enabled attackers to slurp a user’s network authentication details – but not before someone else patched it first. Security researcher Alex Inführ discovered a flaw in Adobe Reader which enabled a malicious PDF file to trigger a callback from the program. A compromised program would communicate […]
Read MoreHow to prevent and recover from an APT attack through a managed service provider
Posted on February 13th, 2019 by Responsible Cyber
What better way to enter a targeted system than through a firm that already has access to the targeted firm. The tactic is not new. In fact, attacking a target through its weakest link is a tried and true method. For this reason, managed service providers (MSPs), companies that are hired to manage the IT […]
Read MoreAustralia and Huawei: Why the ban?
Posted on February 12th, 2019 by Responsible Cyber
By now, you may have heard that Australia has excluded Huawei from the upcoming rollout of the nationwide 5G mobile infrastructure. The decision has made manufacturers, telecommunication experts, and politicians around the world stand up and take notice. Even some consumers, including those who use Huawei smartphones and tablets, wonder what this could mean for […]
Read More