HackDig : Dig high-quality web security articles for hacker

Proteus: 1 – CTF Walkthrough

Proteus is a relatively new machine that came on VulnHub. Created by Ivanvza, it surfaced on June 7th, 2017. It can be downloaded from https://www.vulnhub.com/entry/proteus-1,193/The objective is to get root privileges and get the flag.Downloaded and fired up, it presents with a login screen with no other information at all apart from telling us that i
Publish At:2017-11-06 09:15 | Read:1673 | Comments:0 | Tags:Hacking

The Future of Information Security

1. IntroductionIn this article, we look at the current trends in the field of information security and present speculations as to what the future of the field would be. It should be noted that unpredicted emergence of disrupting innovations may radically change the existing information security landscape. Nevertheless, we may reasonably expect that the
Publish At:2017-11-06 09:15 | Read:842 | Comments:0 | Tags:General Security

Is AI really the Future of Cyber Security

As we progressively get more dependent on technological innovation in our daily lives, we open ourselves up to cyber-attacks. Each device that we use today is vulnerable to cyber-attacks. Hackers are rapidly evolving to come up with new strategies and attack to breach our systems, steal our information or sabotage it for ransom drives.Cybersecurity ris
Publish At:2017-11-06 09:15 | Read:1319 | Comments:0 | Tags:Hacking

Cyber Security-as-a-Service: A Solution for Defending Against Network Attacks

As on-line crime continues to surge in 2017, companies are increasing their cyber-security investments to protect their data and assets. In addition to technical countermeasures, employees’ awareness and the implementation of stricter security policies, a new solution is being considered for defending against Internet crime threats: cyber securit
Publish At:2017-11-06 09:15 | Read:735 | Comments:0 | Tags:Network Security

Estonia suspends security digital certificates for up to 760,000 state-issued electronic ID-cards over Identity-Theft ri

It has happened, one of the most cyber-savvy states, Estonia decided to block Electronic ID Cards over identity theft risk. On Thursday, Estonia announced that it would suspend security digital certificates for up to 760,000 state-issued electronic ID-cards that are using the buggy chips to mitigate the risk of identity theft. The decision comes after IT sec
Publish At:2017-11-05 16:20 | Read:1426 | Comments:0 | Tags:Breaking News Digital ID Security

US DoJ Identifies at least 6 Russian Government officials Involved in DNC hack

The United States Department of Justice has gathered evidence to charge at least six Russian government officials involved in the 2016 DNC hack. The United States Department of Justice has gathered evidence to charge at least six Russian government officials involved in the DNC hack during the 2016 Presidential election. In the past months, US intelligence b
Publish At:2017-11-05 16:20 | Read:1087 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence DNC hack Ru

Hackers poisoned Google Search results to spread Zeus Panda banking Trojan

Experts at Cisco Talos observed crooks exploiting black Search Engine Optimization (SEO) to spread the Zeus Panda banking Trojan. Threat actors behind the Zeus Panda banking Trojan leveraged black Search Engine Optimization (SEO) to propose malicious links in the search results. Crooks were focused on financial-related keyword queries. The campaign was first
Publish At:2017-11-05 16:20 | Read:1274 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Black Seo Cybercri

Fake WhatsApp app in official Google Play Store downloaded by over a million Android users

A fake WhatsApp version deployed on the Play Store was downloaded by over a million users, a failure for the automated checks implemented by Google. Once again crooks exploited the official Google’s Play Store as a repository for malicious apps. This time a fake WhatsApp version was used to infect over a million users that downloaded it. The fake Whats
Publish At:2017-11-05 16:20 | Read:1391 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile

Tor Project fixed TorMoil, a critical Tor Browser flaw that can leak users IP Address

The Tor Project fixed a critical vulnerability dubbed TorMoil that could leak users real IP addresses to potential attackers. Tor users must update their Tor browser to fix a critical vulnerability, dubbed TorMoil, that could leak their real IP addresses to potential attackers when they visit websites with certain content. The Tor Project released the Tor Br
Publish At:2017-11-05 16:20 | Read:1364 | Comments:0 | Tags:Breaking News Hacking anonymity encryption Tor Tor Project T

Hacker threatens Canadian University to dump student info unless the university pay a ransom

A hacker is attempting to extort the Canadian University of Fraser Valley (UFV), threatening to dump student information unless the university pays a ransom. Extortion is a winning criminal model for crooks, a hacker is attempting to extort the Canadian University of Fraser Valley (UFV), threatening to dump student information unless the university pay 30,00
Publish At:2017-11-05 16:20 | Read:1282 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Canadian University Cyberc

Flaws in IEEE P1735 electronics standard expose intellectual property

Experts discovered flaws in IEEE P1735 electronics standard, which describes methods for encrypting electronic-design intellectual property (IP). Crypto flaws in the IEEE P1735 electronics standard expose highly-valuable intellectual property in plaintext. The IEEE P1735 electronics standard provides recommendations on methods and techniques for encrypting e
Publish At:2017-11-05 16:20 | Read:1736 | Comments:0 | Tags:Breaking News Hacking Security IEEE P1735 electronics standa

Security Affairs newsletter Round 135 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again thank you! IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsats SATCOM systems Matrix Ransomware being distributed through malvertising Security Affairs newsletter Round 134 – News of the week Hash
Publish At:2017-11-05 16:20 | Read:1254 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Popular Anime crunchyroll.com hijacked to distribute a keylogger

The popular Anime site Crunchyroll.com was hijacked to distribute malware, according to the operators the site was not hacked. The popular Anime site Crunchyroll.com was hijacked to distribute malware, once discovered the hack, the operators have issued alerts informing visitors to don’t visit the site and later they took it offline. And for our Engli
Publish At:2017-11-05 16:20 | Read:1248 | Comments:0 | Tags:Breaking News Cyber Crime Hacking crunchyroll DNS hijack key

The NIC Asia Bank is the last victim of the SWIFT hackers

The NIC Asia Bank requested the support of the Central Investigation Bureau of Nepal Police to track down the crooks who hacked the SWIFT server. Once again hackers targeted SWIFT systems to steal money from a financial institution. The victim is the NIC Asia Bank that once discovered illegal fund transfer with its SWIFT server requested support from the Cen
Publish At:2017-11-05 16:20 | Read:1481 | Comments:0 | Tags:Breaking News Cyber Crime Hacking banking cyber heist Cyberc

Situational awareness and ICS Using GRASS MARLIN

IntroductionSituational awareness within the industrial control system (ICS) realm is a hot topic, with the recent release of commercial products targeting this niche market. However, there may be a U.S. Government-sponsored program that meets the necessary criteria for the needs of your organization.What is it?First, what is situational awareness? The
Publish At:2017-11-04 20:25 | Read:795 | Comments:0 | Tags:General Security

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud