Android Phones Can Get Hacked Just by Looking at a PNG Image

Posted on February 15th, 2019 by Responsible Cyber

Using an Android device?Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile […]

Read More

Android Phones Can Get Hacked Just by Looking at a PNG Image

Posted on February 6th, 2019 by Responsible Cyber

Using an Android device?Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile […]

Read More

Mitigating the Security Risks of Cloud-Native Applications

Posted on February 6th, 2019 by Responsible Cyber

While containers can create more secure application development environments, they also introduce new security challenges that affect security and compliance. Containers represent the most significant computing advancements for enterprise IT since VMware introduced its first virtualization product, Workstation 1.0, in 1999. They enable organizations to build, ship, and run applications faster than ever, fueling the […]

Read More

FaceTime Bug an AppSec Fail

Posted on January 30th, 2019 by Responsible Cyber

Apple has shut off Group FaceTime while it prepares a fix for a newly found security flaw found by a 14-year-old gamer. The glaring security flaw in FaceTime that has rocked the Apple community since it went viral late yesterday was actually was first found on January 19 by a 14-year-old who stumbled upon it while […]

Read More