HackDig : Dig high-quality web security articles for hacker

How to Hack an Instagram Account – Newbie Friendly Tutorial (2019 Methods)

Instagram is without doubts a leading social network of nowadays. Millions of people from all over the world are browsing trough its news feed daily, posting moments from their life, following other users, celebrities and stuff what interest them. With a huge rise of Instagram’s popularity, with hundreds of thousands daily active users, it’s a common thing t
Publish At:2019-11-14 15:50 | Read:69 | Comments:0 | Tags:Uncategorized

Apple Employee Texts Himself Customer's Nude

A California woman has issued a warning on Facebook after discovering that an Apple store employee texted himself an intimate photo from her phone. Gloria Fuentes took her phone into the Valley Plaza Apple store in Bakersfield, California, on November 4 to get the screen repaired.Before handing her phone over to a man on the tech team, Fuentes
Publish At:2019-11-14 15:30 | Read:73 | Comments:0 | Tags:No Tag

Boom in Lookalike Retail Domains

New research into domains registered with a trusted TLS certificate has found lookalike domains outnumber legitimate retails sites by more than 2:1.In a study conducted by researchers at Venafi, suspicious domains targeting 20 major retailers in the US, UK, France, Germany, and Australia were analyzed. Researchers found over 100,000 lookalike
Publish At:2019-11-14 15:30 | Read:110 | Comments:0 | Tags:No Tag

Capture the Flag Competition Aims to Trace Missing Persons

Cyber professionals will compete to find leads in real missing persons cases in a competition in Washington, DC, next month. SANS Institute has teamed up with non-profit organization Trace Labs to host the Open-Source Intelligence (OSINT) Missing Persons Capture the Flag (CTF) in partnership with local, state, and federal law enforcement agenc
Publish At:2019-11-14 15:30 | Read:50 | Comments:0 | Tags:No Tag

Introducing iVerify, the security toolkit for iPhone users

“If privacy matters, it should matter to the phone your life is on.” So says Apple in their recent ads about Privacy on the iPhone and controlling the data you share—but many of the security features they highlight are opt-in, and users often don’t know when or how to activate them. But hey… we got your back! Today, Trail of Bits launched i
Publish At:2019-11-14 15:25 | Read:54 | Comments:0 | Tags:Apple Education Exploits Guides iVerify Press Release Privac

Iranian APT33 Hackers Use Special Botnets for High-Value Targets in U.S.

An Iran-linked cyberespionage group tracked as APT33 has used obfuscated botnets as part of attacks aimed at high-value targets located in the United States, the Middle East and Asia, Trend Micro reported on Thursday.APT33, which some experts believe has been active since at least 2013, is also known as Refined Kitten, Elfin, Magnallium and Holmium. It has t
Publish At:2019-11-14 12:00 | Read:56 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Virus &

How Does Your Cyber Resilience Measure Up?

The security measures companies take today may not be enough for tomorrow's cyber assault, but switching to a proactive, risk-based framework may better protect your organization.The frequency and sophistication of worldwide cyberattacks continue to surge, with businesses falling victim to a ransomware attacks every 13.275 seconds, according to Cyber De
Publish At:2019-11-14 11:50 | Read:107 | Comments:0 | Tags:No Tag

Optergy BMS 2.0.3a Remote Root

#!/usr/bin/env python## Unauthenticated Remote Root Exploit in Optergy BMS (Console Backdoor)## Affected version <=2.0.3a (Proton and Enterprise)# Discovered by Gjoko 'LiquidWorm' Krstic## CVE: CVE-2019-7276# Advisory: https://applied-risk.com/resources/ar-2019-008#################################################################################
Publish At:2019-11-14 11:10 | Read:47 | Comments:0 | Tags:No Tag

Prima FlexAir Access Control 2.3.35 Database Backup Predictable Name

#!/usr/bin/env python# -*- coding: utf8 -*-## Prima FlexAir Access Control 2.3.35 Database Backup Predictable Name Exploit# Authentication Bypass (Login with MD5 hash)## CVE: CVE-2019-7666, CVE-2019-7667# Advisory: https://applied-risk.com/resources/ar-2019-007# Paper: https://applied-risk.com/resources/i-own-your-building-management-system## Discovered by G
Publish At:2019-11-14 11:10 | Read:113 | Comments:0 | Tags:No Tag

Australian Universities Adopt Foreign Interference Guidelines

Australia announced measures to combat foreign interference at its universities Thursday, setting new guidelines around the key areas of research collaboration, cybersecurity, and international partnerships.There has been growing concern about China's clout on campuses following a series of hacks, controversial donations and incidents of political intimidati
Publish At:2019-11-14 10:15 | Read:120 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Management & Strategy

New MITRE Foundation Aims to Boost Critical Infrastructure

American not-for-profit organization MITRE Corporation has announced the launch of a tech foundation focused on strengthening critical infrastructure through partnerships with the private sector.Called Engenuity, the foundation is a distinct, non-profit company that has its own board of directors and separate private funding.Through Engenuity, MITRE hopes to
Publish At:2019-11-14 10:15 | Read:77 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Management & Strategy

Technology and Policymakers

Technologists and policymakers largely inhabit two separate worlds. It's an old problem, one that the British scientist CP Snow identified in a 1959 essay entitled The Two Cultures. He called them sciences and humanities, and pointed to the split as a major hindrance to solving the world's problems. The essay was influential -- but 60 years later, nothing ha
Publish At:2019-11-14 09:50 | Read:58 | Comments:0 | Tags:No Tag

For Caught in the Crossfire of Cyberwarfare

Authored by Dr Sandra Bell, Head of Resilience Consulting EMEA, Sungard Availability Services PDF edition of this articleThe 2019 National Cyber Security Centre’s (NCSC) Annual Review does not shy away from naming the four key protagonists when it comes to state-based cyber threats against our country. The review sites China, Russia, North Korea and Ir
Publish At:2019-11-14 09:25 | Read:112 | Comments:0 | Tags:No Tag

Shamoon-Slingers APT33 in Secret New Operations

Security researchers are warning oil and aviation industry organizations to be on their guard after spotting a notorious Iranian APT group using private VPNs to keep its activity hidden.APT33 has been linked to the infamous Shamoon destructive malware which knocked out tens of thousands of PCs at Saudi Aramco in 2012 and has been deployed across Europe and t
Publish At:2019-11-14 08:30 | Read:109 | Comments:0 | Tags:No Tag

Alleged $20M Carding Forum Mastermind Faces US Charges

A Russian national is facing charges of running a $20m carding forum after being extradited from Israel to the US.Aleksei Burkov, 29, arrived at Dulles International Airport on Monday after being arrested initially at Ben-Gurion airport in December 2015, and failing in his appeal attempts over subsequent years to avoid being shipped to the States.Accord
Publish At:2019-11-14 07:40 | Read:33 | Comments:0 | Tags:No Tag


Share high-quality web security related articles with you:)


Tag Cloud