How Can A Security Champion Help Your Development Team?

Posted on April 5th, 2019 by Responsible Cyber

A security champion serves as the voice of the developer while satisfying the needs of the business from a security perspective. In this episode we dig deeper into details on the role of the security champion and what effect having a champion can have on development and security. Listeners will learn about: How to identify […]

Read More

Here’s the List of ~600 MAC Addresses Targeted in Recent ASUS Hack

Posted on March 30th, 2019 by Responsible Cyber

EXCLUSIVE — While revealing details of a massive supply chain cyber attack against ASUS customers, Russian security firm Kaspersky last week didn’t release the full list all MAC addresses that hackers hardcoded into their malware to surgically target a specific pool of users.Instead, Kaspersky released a dedicated offline tool and launched an online web page […]

Read More

2.7M recorded medical calls, audio files left unprotected on web

Posted on February 19th, 2019 by Responsible Cyber

“Your call is very important to us,” you often hear while being put on hold. But calls were clearly not important to the Swedish Healthcare Guide service – at least not important enough to protect the personal privacy or safety of Swedish patients. IDG’s Computer Sweden revealed that 2.7 million recorded calls made to the […]

Read More

Android Phones Can Get Hacked Just by Looking at a PNG Image

Posted on February 15th, 2019 by Responsible Cyber

Using an Android device?Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile […]

Read More

Android Phones Can Get Hacked Just by Looking at a PNG Image

Posted on February 6th, 2019 by Responsible Cyber

Using an Android device?Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the Internet or received through messaging or email apps.Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile […]

Read More

Mitigating the Security Risks of Cloud-Native Applications

Posted on February 6th, 2019 by Responsible Cyber

While containers can create more secure application development environments, they also introduce new security challenges that affect security and compliance. Containers represent the most significant computing advancements for enterprise IT since VMware introduced its first virtualization product, Workstation 1.0, in 1999. They enable organizations to build, ship, and run applications faster than ever, fueling the […]

Read More

FaceTime Bug an AppSec Fail

Posted on January 30th, 2019 by Responsible Cyber

Apple has shut off Group FaceTime while it prepares a fix for a newly found security flaw found by a 14-year-old gamer. The glaring security flaw in FaceTime that has rocked the Apple community since it went viral late yesterday was actually was first found on January 19 by a 14-year-old who stumbled upon it while […]

Read More