HackDig : Dig high-quality web security articles for hacker

15 Easy, Effective Ways to Start Winning Back Your Online Privacy

Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a few minutes. I certainly don’t need any more stuff. However, if I could name one gift that would make me absolutely giddy, it would be getting a chunk of my privacy back. Like most people, the internet knows way too much about me — my age, address, phone
Publish At:2019-10-12 11:20 | Read:185 | Comments:0 | Tags:Family Safety ad blockers children's privacy cloud security

Google Patches 8 Vulnerabilities in Chrome 77

Google this week announced an update for Chrome 77 that addresses 8 security vulnerabilities in the application, including 5 reported by external researchers.The new browser update arrives only a couple of weeks after Google patched four security flaws with the release of Chrome 77.0.3865.90, including two vulnerabilities that, combined with another type of
Publish At:2019-10-12 00:00 | Read:115 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities

'Attor' Cyber-Espionage Platform Used in Attacks Aimed at Russia

A recently uncovered highly targeted cyber-espionage platform that uses Tor for network communication has remained under the radar for at least six years, ESET reports.Referred to as Attor, due to the use of a GSM plugin that leverages the AT command protocol and the use of the Tor network, the espionage operation only hit a few dozen victims during the peri
Publish At:2019-10-12 00:00 | Read:212 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Virus &

FBI: Phishing Can Defeat Two-Factor Authentication

A recent Privacy Industry Notification points to two new hacker tools that can turn a victim's browser into a credential-stealing zombie.Human beings can be tricked. This fact is a hard-to-patch vulnerability in many systems. And that is the tl;dr version of a notice from the FBI that recently hit industry groups.According to the Private Industry Notificatio
Publish At:2019-10-11 23:50 | Read:219 | Comments:0 | Tags:No Tag

Securing the managed service provider (MSP)

Managed service providers (MSPs) have been a boon to midsize enterprise. They allow for offloading technical debt to an agent with the skills and resources to manage it, thereby giving an organization room to focus on growing a business, rather than the particulars of infrastructure. For a long while, third-party service providers were not targeted dire
Publish At:2019-10-11 23:25 | Read:117 | Comments:0 | Tags:Business advanced persistent threats APT APT attacks APTs en

CDM and the 2019 Billington Cybersecurity Summit

Recently, Billington hosted their 10th annual Cybersecurity Summit, one of the premier cybersecurity conferences where industry leaders and government officials join together to discuss the current state of cybersecurity. Several key themes presented themselves throughout the two-day summit, including cloud, cybersecurity legislation, and DHS’s Continuous Di
Publish At:2019-10-11 23:20 | Read:148 | Comments:0 | Tags:Executive Perspectives

Digital Innovation Thrives in Open Pastures

Openness and interoperability are long standing buzzwords in the digital ecosystem, but it is not always clear what it means, and why it is important. For McAfee, embracing these notions is critical to our success, and here’s why. Openness means that we share information, and interoperability means that this information is shared with our eco-system partners
Publish At:2019-10-11 23:20 | Read:237 | Comments:0 | Tags:Executive Perspectives

The Complete Guide to Facial Recognition Technology

Have you ever wondered why your face is scanned at customs when you enter a country? Or how the new iPhone is able to unlock using your face instead of a password? The answer is facial recognition technology (also called FRT). What is Facial Recognition? Techopedia defines facial recognition as, “a biometric software application capable of uniquely identifyi
Publish At:2019-10-11 22:40 | Read:224 | Comments:0 | Tags:Panda Security Technology

Grease the Skids: Improve Training Successes by Optimizing the Environment

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/NCSAM%202.png?width=300&amp;name=NCSAM%202.png" alt="NCSAM 2" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">You have carefully selected a training program. Employees are completing the courses. And yet, they are not reporting suspicious emails and their passwords
Publish At:2019-10-11 22:40 | Read:213 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

US Homeland Security Wants to Subpoena ISPs to Hand Over Data

The cybersecurity branch of the Department of Homeland Security has requested legal permission from Congress to demand data from internet services providers in a bid to prevent cyber-attacks.The Cybersecurity and Infrastructure Security Agency (CISA) has chosen National Cybersecurity Awareness Month to seek administrative subpoena authority, which will give
Publish At:2019-10-11 15:30 | Read:229 | Comments:0 | Tags:No Tag

Most Americans Are Clueless About Private Browsing

New research has found that only a quarter of Americans know that surfing the internet in private browsing mode only prevents other users of the same computer from seeing what you've been up to online.A survey conducted in June by the Pew Research Center asked 4,272 adults living in the United States ten digital knowledge questions. W
Publish At:2019-10-11 15:30 | Read:254 | Comments:0 | Tags:No Tag

Mississippi Shows Flagrant Disregard for Cybersecurity

An audit of Mississippi government institutions has revealed an alarming lack of compliance with standard cybersecurity practices and with the state's own enterprise security program.A survey of 125 state agencies, boards, commissions, and universities conducted by the Office of the State Auditor (OSA) revealed that only 53 had a cybersecurity policy in
Publish At:2019-10-11 15:30 | Read:177 | Comments:0 | Tags:No Tag

Magecart Attack on eCommerce Platform Hits Thousands of Online Shops

Magecart hackers have been gathering sensitive information from thousands of online shops after compromising top ecommerce platform and service provider Volusion.Over the past month, starting September 7, the hackers’ online credit card skimmers were active on 3,126 online shops hosted on Volusion, Trend Micro’s security researchers report.One of the website
Publish At:2019-10-11 12:00 | Read:204 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Fraud & Identity

New Blockchain Solution for IIoT Aims to Solve Scaling Problem

Blockchain, or distributed ledger, is sometimes described as a 'solution in search of a problem'. There are many valid applications outside of pure cybersecurity -- for example, reducing transaction costs in complex legal situations like house purchase, or tracking the location of physical goods in distribution or supply chains -- but improving cybersecurity
Publish At:2019-10-11 12:00 | Read:186 | Comments:0 | Tags:NEWS & INDUSTRY IoT Security

NIST and Microsoft Partner to Improve Enterprise Patching Strategies

The National Institute of Standards and Technology (NIST) and Microsoft this week announced a joint effort aimed at helping enterprises improve their patching strategies. Motivated by massive cyber-attacks such as WannaCry and the devastating NotPetya, the the goal of the initiative is to help organizations plan, implement, and improve their enterprise
Publish At:2019-10-11 12:00 | Read:226 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities


Share high-quality web security related articles with you:)


Tag Cloud