Latest iOS 12.2 Update Patches Some Serious Security Vulnerabilities

Posted on March 30th, 2019 by Responsible Cyber

Apple on Monday released iOS 12.2 to patch a total of 51 security vulnerabilities in its mobile operating system that affects iPhone 5s and later, iPad Air and later, and iPod touch 6th generation.A majority of vulnerabilities Apple patched this month reside in its web rendering engine WebKit, which is used by many apps and […]

Read More

Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack

Posted on March 14th, 2019 by Responsible Cyber

Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild. Microsoft today rolled out security fixes for 64 security vulnerabilities along with four security advisories. Of the bugs patched, 17 are rated critical, 45 are important, one moderate, and one low in severity. Four vulnerabilities are […]

Read More

There May Be a Ceiling on Vulnerability Remediation

Posted on March 14th, 2019 by Responsible Cyber

Most organizations are doing all they can to keep up with the release of vulnerabilities, new research shows. Security has no shortage of metrics — everything from the number of vulnerabilities and attacks to the number of bytes per second in a denial-of-service attack. Now a new report focuses on how long it takes organizations […]

Read More

Web Apps Are Becoming Less Secure

Posted on March 14th, 2019 by Responsible Cyber

Critical vulnerabilities in Web applications tripled in 2018, according to a new study. Buggy Web applications continue to be one of the biggest security weaknesses for a majority of organizations. A new report shows that in fact, the problem actually appears to be getting worse. Positive Technologies analyzed data from Web application security assessments that […]

Read More

More Than 22,000 Vulns Were Disclosed in 2018, 27% Without Fixes

Posted on March 1st, 2019 by Responsible Cyber

As in previous years, input validation vulnerabilities accounted for a substantial proportion of total, Risk Based Security report shows. The number of security vulnerabilities present in web applications and other software shows little signs of coming down anytime soon. A new report from Risk Based Security (RBS) shows that a total of 22,022 security vulnerabilities […]

Read More

Severe Flaws in SHAREit Android App Let Hackers Steal Your Files

Posted on March 1st, 2019 by Responsible Cyber

Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and steal files containing sensitive from a victim’s device.With over 1.5 billion users worldwide, SHAREit is a popular file sharing application for Android, iOS, Windows and Mac that has been designed to help people […]

Read More

New Flaws Re-Enable DMA Attacks On Wide Range of Modern Computers

Posted on March 1st, 2019 by Responsible Cyber

Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux, and FreeBSD, allowing attackers to bypass protection mechanisms introduced to defend against DMA attacks.Known for years, Direct memory access (DMA)-based attacks let an attacker compromise a targeted computer in a matter of seconds […]

Read More

Cyber Extortionists Can Earn $360,000 a Year

Posted on February 22nd, 2019 by Responsible Cyber

Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up. Cybercriminals seeking sensitive data on high net-worth individuals will pay aspiring extortionists an average of $360,000 per year to target executives, lawyers, doctors, and other prominent figures, researchers discovered. The Digital Shadows Photon Research Team […]

Read More

Why Cybersecurity Burnout Is Real (and What to Do About It)

Posted on February 22nd, 2019 by Responsible Cyber

The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here’s how to turn down the pressure. Cybersecurity is one of the only IT roles where there are people actively trying to ruin your day, 24/7. The pressure concerns are well documented. A 2018 global survey […]

Read More

Hackers can invisibly eavesdrop on Bigscreen VR users

Posted on February 22nd, 2019 by Responsible Cyber

Meet the new man-in-the-room attack, which exploited vulnerabilities in the Bigscreen virtual reality (VR) app, allowing attackers to invisibly eavesdrop in VR rooms. Attackers could also exploit the flaws to gain complete control over Bigscreen users’ computers, to secretly deliver malware, and even to start a worm infection spreading through VR. Breathe easy – it’s […]

Read More