Former Albany College Student Charged with Computer Damage

Posted on March 1st, 2019 by Responsible Cyber

Vishwanath Akuthota has been accused of using a ‘USB killer device’ to destroy dozens of computers, officials report. Former Albany College student Vishwanath Akuthota has been arrested and charged with intentionally causing damage to protected computers owned by the College of Saint Rose. A criminal complaint states that on Feb. 14 Akuthota entered several buildings […]

Read More

Researchers break e-signatures in 22 common PDF viewers

Posted on March 1st, 2019 by Responsible Cyber

by Danny Bradbury If you spend much time using computers as an adult, the chances are that you’ve had to electronically sign a document at some point. Many countries accept electronic signatures as legally binding, including the US, Canada, and the UK, where the Law Commission officially concluded that electronic signatures are valid in August […]

Read More

Intel Focuses on Data Center, Firmware Security Ahead of RSAC

Posted on March 1st, 2019 by Responsible Cyber

The new Intel SGX Card is intended to extend application memory security using Intel SGX in existing data center infrastructure. Intel today announced new security tools and updates ahead of next week’s RSA Conference (RSAC). The Intel SGX Card and hardware-based firmware analyzer (HBFA) are intended to provide greater security within data centers and identify […]

Read More

6 ways to equip your phishing tackle box

Posted on February 21st, 2019 by Responsible Cyber

Cyber attackers would likely unanimously agree that using “social engineering” to exploit human vulnerabilities where software and hardware cannot limit all threats is one of the top tools of the trade. These methods of human deception have become uncomfortably widespread.  Phishing attacks can range from basic individual financial theft (such as stealing credit card numbers) […]

Read More

Review: SlashNext is like shooting phish in a barrel

Posted on February 20th, 2019 by Responsible Cyber

Using social engineering in conjunction with malicious program delivery, a technique known as phishing, remains one of the biggest threats to the cybersecurity landscape. If human users can be tricked into taking an action such as downloading malware, connecting with a compromised website, or even providing their credentials directly to criminals, it often overrides many […]

Read More

Android Phones Can Get Hacked Just by Looking at a PNG Image

Posted on February 15th, 2019 by Responsible Cyber

Using an Android device?Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile […]

Read More

More Alleged SIM Swappers Face Justice — Krebs on Security

Posted on February 13th, 2019 by Responsible Cyber

Prosecutors in Northern California have charged two men with using unauthorized SIM swaps to steal and extort money from victims. One of the individuals charged allegedly used a hacker nickname belonging to a key figure in the underground who’s built a solid reputation hijacking mobile phone numbers for profit. According to indictments unsealed this week, Tucson, […]

Read More

Android Phones Can Get Hacked Just by Looking at a PNG Image

Posted on February 6th, 2019 by Responsible Cyber

Using an Android device?Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile […]

Read More

Shellbot Crimeware Re-Emerges in Monero Mining Campaign

Posted on February 6th, 2019 by Responsible Cyber

New attack uses a repurposed version of the Trojan that spreads using Internet Relay Chat. Shellbot crimeware has been spotted in the wild as part of a growing campaign that appears to target infrastructure resources for cryptomining. Tactics, techniques, and procedures observed in this campaign are similar to TTPs seen previousl with the Outlaw Group, […]

Read More