Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Posted on February 15th, 2019 by Responsible Cyber

You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security advice, and common sense, right?But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers?Security researchers at cybersecurity firm Check Point have […]

Read More

Evil USB O.MG Cable opens up Wi-Fi to remote attacks

Posted on February 15th, 2019 by Responsible Cyber

by Lisa Vaas Take a look at one of your USB cables and you’ll probably see an icon. It might look like a trident, with a vector, circle and square stemming off the main branch. What do those three symbols mean? You can find multiple suggestions online. We’re less inclined to believe that it was […]

Read More

Android phones can be hacked remotely by viewing malicious PNG image

Posted on February 14th, 2019 by Responsible Cyber

Your Android could be pwned by simply viewing an innocent-looking image – be it from browsing the internet or an image received via text – according to the Android Security Bulletin issued this month. While this certainly doesn’t apply to all images, Google discovered that a maliciously crafted PNG image could be used to hijack […]

Read More

Beware!! New Windows .exe Malware Found Targeting macOS Computers

Posted on February 14th, 2019 by Responsible Cyber

A malicious Windows EXE file can even infect your Mac computer as well.Yes, you heard me right — a .exe malware on macOS.Security researchers at antivirus firm Trend Micro have discovered a novel way hackers are using in the wild to bypass Apple’s macOS security protection and infect Mac computers by deploying malicious EXE files […]

Read More

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

Posted on February 13th, 2019 by Responsible Cyber

What could be more frightening than a service informing you that all your data is gone—every file and every backup servers are entirely wiped out?The worst nightmare of its kind. Right?But that’s precisely what just happened this week with VFEmail.net, a US-based secure email provider that lost all data and backup files for its users […]

Read More

Severe RCE Flaw Disclosed in Popular LibreOffice and OpenOffice Software

Posted on February 6th, 2019 by Responsible Cyber

It’s 2019, and just opening an innocent looking office document file on your system can still allow hackers to compromise your computer.No, I’m not talking about yet another vulnerability in Microsoft Office, but in two other most popular alternatives—LibreOffice and Apache OpenOffice—free, open source office software used by millions of Windows, MacOS and Linux users.Security […]

Read More

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Posted on February 6th, 2019 by Responsible Cyber

You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security advice, and common sense, right?But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers?Security researchers at cybersecurity firm Check Point have […]

Read More

Nest Secure had a secret microphone, can now be a Google Assistant

Posted on February 5th, 2019 by Responsible Cyber

If your IoT device secretly contained a microphone, which was previously undocumented, would you be happy when the device maker announced an over-the-air update that can enable the microphone for virtual assistant voice functionality? That’s what happened with the security alarm system Nest Secure. @nest where in any of the nest guard product materials does […]

Read More

Hacker who reported flaw in Hungarian Telekom faces up to 8-years in prison

Posted on February 2nd, 2019 by Responsible Cyber

Many of you might have this question in your mind:”Is it illegal to test a website for vulnerability without permission from the owner?”Or… “Is it illegal to disclose a vulnerability publicly?”Well, the answer is YES, it’s illegal most of the times and doing so could backfire even when you have good intentions.Last year, Hungarian police […]

Read More

How to Recover Lost or Deleted Files?

Posted on February 1st, 2019 by Responsible Cyber

Have you ever lost your important files, like memories or official documents, accidentally or maliciously?Adding more… when you even do not have any backup for the same.Unfortunate, right? We’ve all been there.Just last week I formatted my computer and later found that I didn’t have any backup for some recently saved important files. It was […]

Read More