Hackers Stole Customers’ Credit Cards from 103 Checkers and Rally’s Restaurants

Posted on May 31st, 2019 by Responsible Cyber

If you have swiped your payment card at the popular Checkers and Rally’s drive-through restaurant chains in past 2-3 years, you should immediately request your bank to block your card and notify it if you notice any suspicious transaction.Checkers, one of the largest drive-through restaurant chains in the United States, disclosed a massive long-running data […]

Read More

Security Recruiter Directory

Posted on May 31st, 2019 by Responsible Cyber

Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next Chief Security Officer (CSO), Chief Information Security Officer (CISO), or VP of Security and fill hard-to-hire positions in risk management, security operations, security engineering, compliance, application security, penetration testers, […]

Read More

Should Failing Phish Tests Be a Fireable Offense? — Krebs on Security

Posted on May 31st, 2019 by Responsible Cyber

Would your average Internet user be any more vigilant against phishing scams if he or she faced the real possibility of losing their job after falling for one too many of these emails? Recently, I met someone at a conference who said his employer had in fact terminated employees for such repeated infractions. As this was […]

Read More

Some Androids don’t call 911 when you tell them to call an ambulance

Posted on May 22nd, 2019 by Responsible Cyber

by Lisa Vaas Somebody’s not breathing. You panic, you grab your phone, and you call for an ambulance. Or do you? Unfortunately, if you’re using an Android phone, you might not be. You could instead be calling for, say, medical transportation that isn’t authorized to respond to emergencies. As the Idaho Statesmen reported recently, Android […]

Read More

A hacker or your cloud provider. Who presents the greatest risk to your data?

Posted on April 6th, 2019 by Responsible Cyber

It’s your worst nightmare. All of your most important and sensitive data, the thing your business values most, the thing your company cannot operate without, the thing your regulators require you to protect, has been taken hostage. Your business grinds to a halt. Your customers and business partners are livid. Your regulators are demanding an […]

Read More

Recovering Smartphone Typing from Microphone Sounds

Posted on April 6th, 2019 by Responsible Cyber

Yet another side-channel attack on smartphones: “Hearing your touch: A new acoustic side channel on smartphones,” by Ilia Shumailov, Laurent Simon, Jeff Yan, and Ross Anderson. Abstract: We present the first acoustic side-channel attack that recovers what users type on the virtual keyboard of their touch-screen smartphone or tablet. When a user taps the screen […]

Read More

Hackers Could Turn Pre-Installed Antivirus App on Xiaomi Phones Into Malware

Posted on April 6th, 2019 by Responsible Cyber

What could be worse than this, if the software that’s meant to protect your devices leave backdoors open for hackers or turn into malware?Researchers today revealed that a security app that comes pre-installed on more than 150 million devices manufactured by Xiaomi, China’s biggest and world’s 4th largest smartphone company, was suffering from multiple issues […]

Read More

Insecure UC Browser ‘Feature’ Lets Hackers Hijack Android Phones Remotely

Posted on March 30th, 2019 by Responsible Cyber

Beware! If you are using UC Browser on your smartphones, you should consider uninstalling it immediately.Why? Because the China-made UC Browser contains a “questionable” ability that could be exploited by remote attackers to automatically download and execute code on your Android devices.Developed by Alibaba-owned UCWeb, UC Browser is one of the most popular mobile browsers, […]

Read More

Critical Magento SQL Injection Vulnerability Discovered – Patch Your Sites

Posted on March 30th, 2019 by Responsible Cyber

If your online e-commerce business is running over the Magento platform, you must pay attention to this information.Magento yesterday released new versions of its content management software to address a total of 37 newly-discovered security vulnerabilities.Owned by Adobe since mid-2018, Magento is one of the most popular content management system (CMS) platform that powers 28% […]

Read More

New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites

Posted on March 14th, 2019 by Responsible Cyber

If for some reason your WordPress-based website has not yet been automatically updated to the latest version 5.1.1, it’s highly recommended to immediately upgrade it before hackers could take advantage of a newly disclosed vulnerability to hack your website.Simon Scannell, a researcher at RIPS Technologies GmbH, who previously reported multiple critical vulnerabilities in WordPress, has […]

Read More