Threat Group Employs Amazon-Style Fulfillment Model to Distribute Malware

Posted on April 6th, 2019 by Responsible Cyber

The operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals. A threat group with possible connections to the operators of the notorious Necurs botnet has employed what security vendor Bromium this week described as an Amazon-style fulfillment model […]

Read More

Unpatched Flaw in Xiaomi’s Built-in Browser App Lets Hackers Spoof URLs

Posted on April 6th, 2019 by Responsible Cyber

EXCLUSIVE — Beware, if you are using a Xiaomi’s Mi or Redmi smartphone, you should immediately stop using its built-in MI browser or the Mint browser available on Google Play Store for non-Xiaomi Android devices.That’s because both web browser apps created by Xiaomi are vulnerable to a critical vulnerability which has not yet been patched […]

Read More

WordPress iOS App Bug Leaked Secret Access Tokens to Third-Party Sites

Posted on April 6th, 2019 by Responsible Cyber

If you have a “private” blog with WordPress.com and are using its official iOS app to create or edit posts and pages, the secret authentication token for your admin account might have accidentally been leaked to third-party websites.WordPress has recently patched a severe vulnerability in its iOS application that apparently leaked secret authorization tokens for […]

Read More

Insecure UC Browser ‘Feature’ Lets Hackers Hijack Android Phones Remotely

Posted on March 30th, 2019 by Responsible Cyber

Beware! If you are using UC Browser on your smartphones, you should consider uninstalling it immediately.Why? Because the China-made UC Browser contains a “questionable” ability that could be exploited by remote attackers to automatically download and execute code on your Android devices.Developed by Alibaba-owned UCWeb, UC Browser is one of the most popular mobile browsers, […]

Read More

Hacker AI vs. Enterprise AI: A New Threat

Posted on March 24th, 2019 by Responsible Cyber

Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use. The adversarial use of artificial intelligence (AI) and machine learning (ML) in malicious ways by attackers may be embryonic, but the prospect is becoming real. It’s evolutionary: AI and ML gradually have found their way out of […]

Read More

Get 4 Essential CyberSecurity Software For Less Than $10 Per Month

Posted on March 24th, 2019 by Responsible Cyber

Major data breaches and cyber attacks are occurring at an alarming rate, and if you are still not using a VPN and password manager app, you are seriously out of excuses.Not just VPN software and a password manager, cybersecurity experts also recommend using antivirus and backup solutions to protect your computers and precious data stored […]

Read More

Magecart payment card skimmer gang returns stronger than ever

Posted on March 22nd, 2019 by Responsible Cyber

Hackers are using increasingly sophisticated techniques to hide malicious code on e-commerce websites with the goal of stealing payment card details. Known as web skimmers, these malicious scripts have led to major breaches at online retailers over the past year and will very likely continue to cause problems for some time to come. Hacking into […]

Read More

Hackers use Slack to hide malware communications

Posted on March 14th, 2019 by Responsible Cyber

A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack. While abusing legitimate services for malware command-and-control purposes is not a new development, this is the first time researchers have seen Slack, a popular enterprise collaboration tool, being used in this way. The backdoor was detected by […]

Read More

Former Albany College Student Charged with Computer Damage

Posted on March 1st, 2019 by Responsible Cyber

Vishwanath Akuthota has been accused of using a ‘USB killer device’ to destroy dozens of computers, officials report. Former Albany College student Vishwanath Akuthota has been arrested and charged with intentionally causing damage to protected computers owned by the College of Saint Rose. A criminal complaint states that on Feb. 14 Akuthota entered several buildings […]

Read More

Researchers break e-signatures in 22 common PDF viewers

Posted on March 1st, 2019 by Responsible Cyber

by Danny Bradbury If you spend much time using computers as an adult, the chances are that you’ve had to electronically sign a document at some point. Many countries accept electronic signatures as legally binding, including the US, Canada, and the UK, where the Law Commission officially concluded that electronic signatures are valid in August […]

Read More