HackDig : Dig high-quality web security articles for hacker

What’s new in Kubernetes 1.17?

Kubernetes 1.17 is about to be released! This short-cycle release is focused on small improvements and house cleaning. There are implementation optimizations all over the place, new features like the promising topology aware routing, and improvements to the dual-stack support. Here is the list of what’s new in Kubernetes 1.17. This is what’s new in #
Publish At:2019-12-06 23:50 | Read:195 | Comments:0 | Tags:Uncategorized Kubernetes Release Notes

Facebook Sues Chinese Company Over Ad Fraud

Facebook on Thursday filed suit in California against one organization and two individuals for engaging in ad fraud on the social media platform.The defendants, Hong Kong-based ILikeAd Media International Company Ltd. and its employees, Chen Xiao Cong and Huang Tao, tricked Facebook users into installing malware that provided them with the ability to comprom
Publish At:2019-12-06 22:15 | Read:72 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Fraud & Identity

Vulnerabilities Found in Aviatrix Enterprise VPN

Two local privilege escalation vulnerabilities have been identified by a researcher in an enterprise VPN product from cloud-native networking solutions provider Aviatrix.Aviatrix claims to have over 400 customers worldwide, including companies such as Netflix, United Airlines, Docker, Epsilon, and some major hotel chains.Immersive Labs researcher Alex Seymou
Publish At:2019-12-06 22:15 | Read:128 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities

Russian 'Gamaredon' Hackers Back at Targeting Ukraine Officials

The Russian state-sponsored hacking group known as Gamaredon has been targeting various Ukrainian diplomats, government and military officials, and law enforcement since mid-October 2019, threat intelligence company Anomali reports.Active since at least mid-2013 and also known as Primitive Bear, the Gamaredon group was first analyzed in April 2015. Over the
Publish At:2019-12-06 22:15 | Read:90 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Virus &

Senators Call for End to Controversial NSA Program

The program for collecting telephone call metadata has faced increased scrutiny and restrictions since Edward Snowden revealed its existence in 2013.Republicans and Democrats in Congress have come together to support ending one of the National Security Agency's more controversial surveillance programs. The call-detail records program, which collects metadata
Publish At:2019-12-06 22:10 | Read:128 | Comments:0 | Tags:No Tag

Data Center Provider CyrusOne Confirms Ransomware Attack

The attack struck CyrusOne's managed services division and compromised six customers primarily serviced by a New York data center.CyrusOne, a major provider of data center facilities with more than 1,000 customers and 45 data centers, this week confirmed a ransomware attack aimed at its managed services division.In a statement issued Thursday, the company an
Publish At:2019-12-06 22:10 | Read:191 | Comments:0 | Tags:No Tag

Fake Elder Scrolls Online developers go phishing on PlayStation

A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via Playstation messaging. This particular phishing attempt is notable for ramping up the pressure on recipients—a classic social engineering technique taken to the extreme. A terms of service violation? In MMORPG land, the scammers take a theoretically pla
Publish At:2019-12-06 16:50 | Read:163 | Comments:0 | Tags:Social engineering elder scrolls online ESO gamers gaming ga

‘Tis the Season for Cybersecurity: Stay Protected This Holiday Season

It’s beginning to look a lot like the holiday season – and with the holidays comes various opportunities for cyber-scrooges to exploit. While users prepare for the festivities, cybercriminals look for opportunities to scam holiday shoppers with various tricks. To shed more light on how these crooks are putting a damper on user’s holiday season, McAfee survey
Publish At:2019-12-06 16:45 | Read:175 | Comments:0 | Tags:Consumer Threat Notices mobile security computer security em

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

Whether it be that their shoes are too tight, their heads aren’t screwed on just right, or they’re expressing a little bit of “Bah Humbug,” cyber-grinches and cyber-scrooges everywhere view the holiday season as a perfect opportunity to exploit users. In fact, McAfee recently conducted a survey of over 1,000 adults over the age of 18 in the U.S. from October
Publish At:2019-12-06 16:45 | Read:208 | Comments:0 | Tags:Consumer Threat Notices identity theft malware mobile securi

Are Smart Padlocks Secure Enough to Protect Your Packages?

“Hackable?” host Geoff Siskind likes to shop online. A lot. What he doesn’t like is how often his packages are stolen from his front porch. Desperate for a solution, he’s intrigued by smart padlocks that promise to protect packages. But after five seasons of hosting “Hackable?” Geoff is skeptical that anything smart is also secure. On the latest episode, he
Publish At:2019-12-06 16:45 | Read:170 | Comments:0 | Tags:Hackable? Podcast

Could Your Child be Sexting? Signs to Look for and Ways to Respond

Oh, what we wouldn’t do to travel back in time to the days before smartphones kid-jacked our families, right? But here we are. Our kids are forever connected. And, it’s up to parents to help them navigate the risks — one of which is sexting. Ouch. Even reading the word may make any parent want to click off this post and run. But don’t. Stay
Publish At:2019-12-06 16:45 | Read:123 | Comments:0 | Tags:Family Safety facebook social networking protecting kids onl

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and flee with the contents of the vault. Fortunately, the building was equipped with strong detection security measures, and the burglar—unaware of the location of a laser tripwire—soon set off a silent alarm. A handful of the best
Publish At:2019-12-06 16:45 | Read:130 | Comments:0 | Tags:Endpoint Security endpoint EDR

Beat Black Friday Scammers: Secure Your Online Purchases From Fake Payment Processors

They see you when you’re shopping, they know when you click “pay” – cybercriminals, that is. With Black Friday and Cyber Monday deals flooding the internet, malicious actors have many opportunities to exploit users rushing to purchase gifts for family and friends. And according to Ars Technica, thieves have devised a new way to steal payment-card
Publish At:2019-12-06 16:45 | Read:89 | Comments:0 | Tags:Consumer Threat Notices data protection cybersecurity vulner

7 Ways to Wreck a Cybercrook’s Holidays

’Tis the season for giving and who better to give a giant headache to than the digital scammers working overtime to wreck our holidays? Can we spot and unravel every scam out there? Probably not. But, by taking a few minutes to get equipped to click, we can dodge common traps laid by cybercrooks and wreck their holidays before they get a chance to wreck ours
Publish At:2019-12-06 16:45 | Read:129 | Comments:0 | Tags:Family Safety cybercrime identity theft malware computer sec

How to Ensure You Don’t Fall Victim to a Holiday Scam this Festive Season

If Benjamin Franklin were alive today, I have no doubt that he’d revise his famous quote: ‘Nothing can be said to be certain except death and taxes’ to include online holiday scams! For there is no question that online scammers and cybercriminals love the festive season! The bulk of us are time-poor, stressed, and sporting to-do lists as long as our arms – s
Publish At:2019-12-06 16:45 | Read:141 | Comments:0 | Tags:Consumer Threat Notices cybercrime identity theft email and


Share high-quality web security related articles with you:)


Tag Cloud