HackDig : Dig high-quality web security articles for hacker

Virtual Reality Could Serve as a Cybersecurity Recruiting Tool

A recent study finds 74% of millennials and post-millennials agree VR use in cybersecurity tools may entice them into an IT security career.Cybersecurity tools that employ immersive technologies such as virtual reality and augmented reality could attract millennials and post-millennials to IT security careers, a new study shows.Across the globe, the IT secur
Publish At:2017-11-06 22:20 | Read:33279 | Comments:0 | Tags:No Tag

External Attacker Leaked 'Paradise Papers,' Law Firm Reports

The Paradise Papers contain 13.4m documents allegedly hacked by an outsider, the targeted law firm reports.The release of the Paradise Papers, a collection of 13.4 million documents, has revealed tax affairs of the ultra-wealthy, reports the BBC. Most of the papers came from offshore legal firm Appleby, which says the leak came from a hack on its network and
Publish At:2017-11-06 22:20 | Read:8540 | Comments:0 | Tags:No Tag

When Ransomware Strikes: 7 Steps You Can Take Now to Prepare

Ransomware is still on the rise. These operational tips can help lessen the blow if you're hit. If you walked into work tomorrow to find your company had been hit by ransomware, would you know what to do? Who would you call? How would you find their phone numbers if your computer was locked up? How would you notify customers?There are many aspects to prepari
Publish At:2017-11-06 22:20 | Read:2482 | Comments:0 | Tags:No Tag

DDoS Flaw Found in Brother Printers

All Brother printers with a Debut Web front-end carry a flaw that allows attackers to distribute a single malformed HTTP POST request, researchers revealed today. A vulnerability discovered in the Debut embedded Web front-end in all Brother printer models could allow attackers to launch a DDoS attack against the printers, according to research released today
Publish At:2017-11-06 22:20 | Read:2127 | Comments:0 | Tags: DDOS

Cognitive Mindhacks: How Attackers Spread Disinformation Campaigns

Researchers investigate the tools and techniques behind cyber propaganda and fake news and how it changes public opinion.Disinformation campaigns, otherwise known as cyber propaganda, cognitive hacking, information warfare, and the more common "fake news," have roots in history but are increasingly relevant, and dangerous, as actors manipulate Web tools to s
Publish At:2017-11-06 22:20 | Read:2582 | Comments:0 | Tags:No Tag

It Takes a Buck to Make a Million on the Dark Web

The cost for malware tools and services can add up, but the returns from cybercrime campaigns can be enormous, says Recorded Future.The payoff from cybercrime can be enormous for aspiring criminals everywhere, but as with many lucrative endeavors, sometimes it takes a little investment up front to get you off the ground.Take a banking botnet operation. A dec
Publish At:2017-11-06 22:20 | Read:2005 | Comments:0 | Tags:No Tag

Daphne Caruana Galizia's Murder and the Security of WhatsApp

Daphne Caruana Galizia was a Maltese journalist whose anti-corruption investigations exposed powerful people. She was murdered in October by a car bomb. Galizia used WhatsApp to communicate securely with her sources. Now that she is dead, the Maltese police want to break into her phone or the app, and find out who those sources were. One journalist reports
Publish At:2017-11-06 19:20 | Read:1914 | Comments:0 | Tags:No Tag

Spam: The Security Threat You Easily Forget

About this time last year, I spoke at a Cybersecurity conference in Krakow. I was asked during a video interview to identify security threats that I believed were most pressing. (Ignore the suit...)Yes, I said spam.Not DDoS? Not ransomware? Not breach of personal data? Not IoT? Are you daft, Dave?No.My thinking has not changed a full year later.Spam is a cri
Publish At:2017-11-06 18:05 | Read:2300 | Comments:0 | Tags:No Tag

ChessMaster’s New Strategy: Evolving Tools and Tactics

by MingYen Hsieh, CH Lei, and Kawabata Kohei A few months ago, we covered the ChessMaster cyberespionage campaign, which leveraged a variety of toolsets and malware such as ChChes and remote access trojans like RedLeaves and PlugX to compromise its targets—primarily organizations in Japan. A few weeks ago, we observed new activity from ChessMaster, with nota
Publish At:2017-11-06 17:10 | Read:3720 | Comments:0 | Tags:Bad Sites Targeted Attacks ChessMaster

CVE-2017-12969 Avaya OfficeScan IPO Remote ActiveX Buffer Overflow

[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt[+] ISR: apparitionSecVendor:=============www.avaya.comProduct:===========Avaya IP Office (IPO)v9.1.0 - 10.1IP Office is Avaya's global midsize
Publish At:2017-11-06 11:00 | Read:2115 | Comments:0 | Tags:No Tag

The GIBON Ransomware appears in the threat landscape

A new strain of ransomware dubbed GIBON ransomware was spotted by the ProofPoint researcher Matthew Mesa that observed it being distributed via malspam. The spam messages use a malicious document as attachment containing macros that once enabled will download and install the ransomware on a victim’s machine. The researcher dubbed the ransomware GIBON b
Publish At:2017-11-06 10:45 | Read:4510 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime GIBON Ransomwar

Hackers leak WhatsApp screenshots and intimate photos of WWE Diva Paige

A new batch of WhatsApp screenshots and intimate photos of the WWE celebrity Diva Paige was published on a popular celebrity leak website. In March, hackers leaked online nude photos and videos of WWE Diva Paige (real name is Saraya Jade-Bevis), and now a new batch of x-rated images of the celebrity appeared on the Internet. Personal and private photos of m
Publish At:2017-11-06 10:45 | Read:6849 | Comments:0 | Tags:Breaking News Hacking Apple brute force celebrities data lea

KRACK Detector is a tool to detect and prevent KRACK attacks in your network

How to discover if your network is vulnerable to KRACK attack? KRACK Detector is a script that can detect attacks against client devices on your network. Last week I published a post warning of many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). The Belgian research
Publish At:2017-11-06 10:45 | Read:4511 | Comments:0 | Tags:Breaking News Hacking Internet of Things KRACK attack KRACK

Getting a Grip on GDPR: The Secret Is Knowing Where to Begin

An old friend once gave me some really valuable advice about reaching a goal. He said that you can’t get to where you’re going if you don’t know where you are. Over the years, I’ve found that to be true in a lot of situations. But I think it’s especially fitting in discussing GDPR readiness. Know Where You Stand With GDPR Readin
Publish At:2017-11-06 09:40 | Read:4016 | Comments:0 | Tags:Data Protection Compliance Cybersecurity Legislation Data Pr

Securing Medical Devices in the Age of the IoT

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches. S
Publish At:2017-11-06 09:40 | Read:3368 | Comments:0 | Tags:Endpoint Health Care Mobile Security Connected Devices Feder


Share high-quality web security related articles with you:)


Tag Cloud