HackDig : Dig high-quality web security articles for hacker

After DHS Notice, 21 States Reveal They Were Targeted During Election

Election officials in swing states Florida, Ohio, and Pennsylvania among those who report Russian state-sponsored attackers targeted their systems.The US Department of Homeland Security notified election officials in all 50 states on Friday, informing 21 that their states had been targeted by Russian state-sponsored cybercriminals during the 2016 election ca
Publish At:2017-09-26 04:10 | Read:107 | Comments:0 | Tags:No Tag

GPS Spoofing Attacks

Wired has a story about a possible GPS spoofing attack by Russia: After trawling through AIS data from recent years, evidence of spoofing becomes clear. Goward says GPS data has placed ships at three different airports and there have been other interesting anomalies. "We would find very large oil tankers who could travel at the maximum speed at 15 knots," s
Publish At:2017-09-26 01:10 | Read:101 | Comments:0 | Tags:No Tag

The Hay CFP Management Method

By Andrew Hay, Co-Founder and CTO, LEO Cyber Security. I speak at a lot of conferences around the world. As a result, people often ask me how I manage the vast number of abstracts and security call for papers (CFPs) submissions. So I thought I’d create a blog post to explain my process. For lack of a better name, let’s call it the Hay CFP Management Method.
Publish At:2017-09-26 00:50 | Read:128 | Comments:0 | Tags:News Security Research

ZNIU: First Android Malware to Exploit Dirty COW Vulnerability

By Jason Gu, Veo Zhang, and Seven Shen We have disclosed this security issue to Google, who verified that they have protections in place against ZNIU courtesy of Google Play Protect. The Linux vulnerability called Dirty COW (CVE-2016-5195) was first disclosed to the public in 2016. The vulnerability was discovered in upstream Linux platforms such as Redhat,
Publish At:2017-09-25 23:15 | Read:50 | Comments:0 | Tags:Bad Sites Malware Mobile Vulnerabilities android Dirty COW L

RedBoot ransomware also modifies partition table, is it a wiper?

The RedBoot ransomware encrypts files on the infected computer, replaces the Master Boot Record and then modifies the partition table. Malware Blocker researcher discovered a new bootlocker ransomware, dubbed RedBoot, that encrypts files on the infected computer, replaces the Master Boot Record (MBR) of the system drive and then modifies the partition table.
Publish At:2017-09-25 16:35 | Read:109 | Comments:0 | Tags:Breaking News Malware Cybercrime malware RedBoot ransomware

Experts say United Cyber Caliphate hackers have low-level cyber capabilities

United Cyber Caliphate members stopped trying to develop their own hacking and communication tools and used to search them into the criminal underground. According to Kyle Wilhoit, a senior security researcher at DomainTools, who made a speech at the DerbyCon hacking conference in US, ISIS members stopped trying to develop their own hacking and communication
Publish At:2017-09-25 16:35 | Read:150 | Comments:0 | Tags:Breaking News Hacking Terrorism Kill List UCC United Cyber C

Adobe accidentally leaked online its Private PGP Key

The Adobe product security incident response team (PSIRT) accidentally published a private PGP key on its blog, once discovered the issue it quickly revoked it. On Friday, the Adobe PSIRT updated its Pretty Good Privacy (PGP) key and published the new public key on the blog post. The new key should have been valid until September 2018, but something strange
Publish At:2017-09-25 16:35 | Read:110 | Comments:0 | Tags:Breaking News Digital ID Hacking Adobe data leak PGP PGP key

Deloitte targeted by a cyber attack that exposed clients’ secret emails

The accountancy firm Deloitte announced it is has been targeted by a sophisticated hack that compromised its global email server. Today the accountancy firm giant Deloitte revealed that is has been targeted by a sophisticated hack that compromised the confidential emails and plans of some of its blue-chip clients. According to The Guardian that first reporte
Publish At:2017-09-25 16:35 | Read:125 | Comments:0 | Tags:Breaking News Data Breach data breach Deloitte hack Hacking

Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks

In health care, cyberthreats pose a substantial risk to patient safety, systems of care and business continuity. The security of electronic medical information has a tremendous impact on data access, which directly affects quality of care, patients’ rights to privacy and the professional standing of health care organizations. Practitioners can only mak
Publish At:2017-09-25 15:30 | Read:74 | Comments:0 | Tags:Data Protection Health Care Electronic Medical Records (EMRs

From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’

Many people in the security industry today grew up watching “Star Trek,” from the original episodes to Next Generation, Deep Space Nine, Voyager, Enterprise and the many other series that followed. In anticipation of the upcoming “Star Trek: Discovery” series, we thought it would be a good time to remind our readers that, beyond the e
Publish At:2017-09-25 15:30 | Read:115 | Comments:0 | Tags:CISO Risk Management Cyber Risk Cybersecurity Incident Respo

Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks

Endpoint attacks can come from any direction and many sources. Just consider the reported vulnerabilities found in Apache Struts and the damage caused by WannaCry and Petya. Companies need to stay one step ahead of endpoint attacks, but they struggle due to a lack of visibility of endpoint status, the complexity of investigations and ineffective remediation.
Publish At:2017-09-25 15:30 | Read:91 | Comments:0 | Tags:Endpoint Incident Response Apache Endpoint Management Endpoi

SecurityIQ Update Adds Healthcare-Specific Modules, Custom Course Notifications

The latest SecurityIQ update includes nine new security awareness modules for healthcare professionals, and custom course notifications to help you increase program completion rates. Read on for complete release details. 9 New Security Awareness Modules for Healthcare Professionals Staying compliant with HIPAA and PPI regulations just became simpler wi
Publish At:2017-09-25 15:05 | Read:158 | Comments:0 | Tags:Security Awareness

CEH Exam Overview: What to Expect

IntroductionFor most of us, “hacking” is a word that conjures up images of frustration and even fear. Hackers have become much bolder, threatening companies of all sizes, and even entire government agencies. Their attacks have become much more sophisticated and harder to detect, let alone defeat.To defeat a hacker, one must be able to think like a hack
Publish At:2017-09-25 15:05 | Read:140 | Comments:0 | Tags:General Security

PMP Exam Overview: What To Expect

IntroductionInterested in boosting your career potential? The project management professional (PMP) credential from the Project Management Institute (PMI) can give you the leg up you want. This certification shows you have the knowledge necessary to manage projects of all sizes and scopes, to determine where breakdowns in processes might be occurring,
Publish At:2017-09-25 15:05 | Read:41 | Comments:0 | Tags:General Security

Security's #1 Problem: Economic Incentives

The industry rewards cutting corners rather than making software safe. Case in point: the Equifax breach. There is plenty of blame to go around after the Equifax incident, and I'm not trying to be an apologist for the credit rating company. The problem is that the wrong incentives are driving software development. Unless we change the incentives, security wi
Publish At:2017-09-25 09:40 | Read:118 | Comments:0 | Tags:No Tag


Share high-quality web security related articles with you:)


Tag Cloud