HackDig : Dig high-quality web security articles for hacker

When Ransomware Strikes: 7 Steps You Can Take Now to Prepare

Ransomware is still on the rise. These operational tips can help lessen the blow if you're hit. If you walked into work tomorrow to find your company had been hit by ransomware, would you know what to do? Who would you call? How would you find their phone numbers if your computer was locked up? How would you notify customers?There are many aspects to prepari
Publish At:2017-11-06 22:20 | Read:1065 | Comments:0 | Tags:No Tag

DDoS Flaw Found in Brother Printers

All Brother printers with a Debut Web front-end carry a flaw that allows attackers to distribute a single malformed HTTP POST request, researchers revealed today. A vulnerability discovered in the Debut embedded Web front-end in all Brother printer models could allow attackers to launch a DDoS attack against the printers, according to research released today
Publish At:2017-11-06 22:20 | Read:1108 | Comments:0 | Tags: DDOS

Cognitive Mindhacks: How Attackers Spread Disinformation Campaigns

Researchers investigate the tools and techniques behind cyber propaganda and fake news and how it changes public opinion.Disinformation campaigns, otherwise known as cyber propaganda, cognitive hacking, information warfare, and the more common "fake news," have roots in history but are increasingly relevant, and dangerous, as actors manipulate Web tools to s
Publish At:2017-11-06 22:20 | Read:1147 | Comments:0 | Tags:No Tag

It Takes a Buck to Make a Million on the Dark Web

The cost for malware tools and services can add up, but the returns from cybercrime campaigns can be enormous, says Recorded Future.The payoff from cybercrime can be enormous for aspiring criminals everywhere, but as with many lucrative endeavors, sometimes it takes a little investment up front to get you off the ground.Take a banking botnet operation. A dec
Publish At:2017-11-06 22:20 | Read:826 | Comments:0 | Tags:No Tag

Daphne Caruana Galizia's Murder and the Security of WhatsApp

Daphne Caruana Galizia was a Maltese journalist whose anti-corruption investigations exposed powerful people. She was murdered in October by a car bomb. Galizia used WhatsApp to communicate securely with her sources. Now that she is dead, the Maltese police want to break into her phone or the app, and find out who those sources were. One journalist reports
Publish At:2017-11-06 19:20 | Read:869 | Comments:0 | Tags:No Tag

Spam: The Security Threat You Easily Forget

About this time last year, I spoke at a Cybersecurity conference in Krakow. I was asked during a video interview to identify security threats that I believed were most pressing. (Ignore the suit...)Yes, I said spam.Not DDoS? Not ransomware? Not breach of personal data? Not IoT? Are you daft, Dave?No.My thinking has not changed a full year later.Spam is a cri
Publish At:2017-11-06 18:05 | Read:773 | Comments:0 | Tags:No Tag

ChessMaster’s New Strategy: Evolving Tools and Tactics

by MingYen Hsieh, CH Lei, and Kawabata Kohei A few months ago, we covered the ChessMaster cyberespionage campaign, which leveraged a variety of toolsets and malware such as ChChes and remote access trojans like RedLeaves and PlugX to compromise its targets—primarily organizations in Japan. A few weeks ago, we observed new activity from ChessMaster, with nota
Publish At:2017-11-06 17:10 | Read:1376 | Comments:0 | Tags:Bad Sites Targeted Attacks ChessMaster

CVE-2017-12969 Avaya OfficeScan IPO Remote ActiveX Buffer Overflow

[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt[+] ISR: apparitionSecVendor:=============www.avaya.comProduct:===========Avaya IP Office (IPO)v9.1.0 - 10.1IP Office is Avaya's global midsize
Publish At:2017-11-06 11:00 | Read:1082 | Comments:0 | Tags:No Tag

The GIBON Ransomware appears in the threat landscape

A new strain of ransomware dubbed GIBON ransomware was spotted by the ProofPoint researcher Matthew Mesa that observed it being distributed via malspam. The spam messages use a malicious document as attachment containing macros that once enabled will download and install the ransomware on a victim’s machine. The researcher dubbed the ransomware GIBON b
Publish At:2017-11-06 10:45 | Read:2726 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime GIBON Ransomwar

Hackers leak WhatsApp screenshots and intimate photos of WWE Diva Paige

A new batch of WhatsApp screenshots and intimate photos of the WWE celebrity Diva Paige was published on a popular celebrity leak website. In March, hackers leaked online nude photos and videos of WWE Diva Paige (real name is Saraya Jade-Bevis), and now a new batch of x-rated images of the celebrity appeared on the Internet. Personal and private photos of m
Publish At:2017-11-06 10:45 | Read:3044 | Comments:0 | Tags:Breaking News Hacking Apple brute force celebrities data lea

KRACK Detector is a tool to detect and prevent KRACK attacks in your network

How to discover if your network is vulnerable to KRACK attack? KRACK Detector is a script that can detect attacks against client devices on your network. Last week I published a post warning of many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). The Belgian research
Publish At:2017-11-06 10:45 | Read:2343 | Comments:0 | Tags:Breaking News Hacking Internet of Things KRACK attack KRACK

Getting a Grip on GDPR: The Secret Is Knowing Where to Begin

An old friend once gave me some really valuable advice about reaching a goal. He said that you can’t get to where you’re going if you don’t know where you are. Over the years, I’ve found that to be true in a lot of situations. But I think it’s especially fitting in discussing GDPR readiness. Know Where You Stand With GDPR Readin
Publish At:2017-11-06 09:40 | Read:2136 | Comments:0 | Tags:Data Protection Compliance Cybersecurity Legislation Data Pr

Securing Medical Devices in the Age of the IoT

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches. S
Publish At:2017-11-06 09:40 | Read:1491 | Comments:0 | Tags:Endpoint Health Care Mobile Security Connected Devices Feder

DDoS attacks in Q3 2017

News Overview In the third quarter of 2017, the trends of the preceding quarters continued to develop further. The number of DDoS attacks in China, the United States, South Korea and Russia increased, which were reflected in the statistics we gathered for botnets. A sharp surge in the number (more than 450 daily) and power (up to 15.8 million packets per sec
Publish At:2017-11-06 09:20 | Read:1535 | Comments:0 | Tags:DDoS reports Featured Botnets DDoS-attacks Internet of Thing

Microsoft Office Dynamic Data Exchange(DDE) attacks

Microsoft Office programs are widely exploited by malware authors by embedding links, objects, and other payloads. Its effects often depend on how the user will interact with documents. Customarily embedded payloads are executed when the user enables macros, but this is not the only way to infect users. There are other methods as well which can infect
Publish At:2017-11-06 09:15 | Read:2061 | Comments:0 | Tags:Hacking


Share high-quality web security related articles with you:)


Tag Cloud