HackDig : Dig high-quality web security articles

Tornados, Necessity, and the Evolution of Mitigating Controls

According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount and type of wind
Publish At:2019-12-02 15:30 | Read:2931 | Comments:0 | Tags:Articles controls history mitigating controls safety securit

Hacking First.org private keys for fun and profit, or maybe not!

Hello everyone, finally the blog is back
Publish At:2019-10-18 04:50 | Read:2954 | Comments:0 | Tags:Articles

Filesystem-Eating Bug Discovered in Linux 4.14

Recent news has reported that an urgent data corruption issued has destroyed file systems in Linux 4.14 and if you are using bcache to speed up your Linux 4.14 you are being urged to stop it immediately if you want your data to survive. Linux Compatibility Linux is an open-source technology and hundreds of programmers have been involved with adding softwar
Publish At:2019-10-18 04:40 | Read:2747 | Comments:0 | Tags:Articles News bcache filesytem kernbel linux

Spectre and Meltdown explained

I found this great article of Anton Gostev about Spectre and Meltdown, so I’m reposting it here : By now, most of you have probably already heard of the biggest disaster in the history of IT – Meltdown and Spectre security vulnerabilities which affect all modern CPUs, from those in desktops and servers, to ones found in smartphones. Unfortunately, ther
Publish At:2019-10-18 04:40 | Read:3361 | Comments:0 | Tags:Articles News bug meltdown security spectre

Useful Resources for Those Who Want to Know More About Linux

Guest post by Lucy Benton Linux is one of the most popular and versatile operating systems available. It can be used on a smartphone, computer and even a car. Linux has been around since the 1990s and is still one of the most widespread operating systems. Linux is actually used to run most of the Internet as it is considered to be rather stable compared to
Publish At:2019-10-18 04:40 | Read:6024 | Comments:2 | Tags:Articles Guides course learning linux operating systems reso

What You Don’t Know About Linux Open Source Could Be Costing to More Than You Think

Guest post by Marc Fisher If you would like to test out Linux before completely switching it as your everyday driver, there are a number of means by which you can do it. Linux was not intended to run on Windows, and Windows was not meant to host Linux. To begin with, and perhaps most of all, Linux is open source computer software. In any event, Linux outperf
Publish At:2019-10-18 04:40 | Read:3036 | Comments:0 | Tags:Articles Opinion Employing Linux open source projects operat

New Tool Release: NPS_Payload

Over the past year, we have seen a lot of research come out which highlights several of Microsoft’s native binaries which can be leveraged by an attacker to compromise or gain access to a system. One of these binaries, msbuild.exe, has proven very reliable in allowing us to gain a shell on a host in a post-exploitation scenario. Casey Smith (@subtee) wrote
Publish At:2017-07-24 07:00 | Read:5241 | Comments:0 | Tags:Articles

Social-Engineer Toolkit (SET) v7.7 “Blackout” Released

TrustedSec is proud to announce a major release of the Social-Engineer Toolkit (SET) v7.7. This version incorporates support for hostnames in the HTA attack vector, and a redesigned Java Applet attack vector. Java is still widely used in corporations and with a valid code signing certificate can be one of the easiest ways to get a shell in an organization. I
Publish At:2017-07-21 05:00 | Read:6184 | Comments:0 | Tags:Articles

RSAC 2017 Ransomware Summit

Nobody likes to think about their company’s critical data being compromised and held for ransom. Unfortunately, this type of threat, dubbed ransomware, cannot be ignored. In the first quarter of 2016 alone, CNN projected that cybercriminals collected more than $200 million through ransomware attacks.   This would make ransomware a nearly $1 billion busi
Publish At:2017-01-10 08:10 | Read:5621 | Comments:0 | Tags:Articles News

Six tips for practicing safe social media

With Facebook now counting over 1.7 billion monthly users and LinkedIn another 467 million, it was only a matter of time until criminal hackers turned their attention to exploiting social media as an attack vector. The current attack is being waged to introduce ransomware into these environments. Dubbed “Imagegate”, it’s a clever way of sneaking malware into
Publish At:2016-12-09 15:50 | Read:5767 | Comments:0 | Tags:Articles Featured news backup social networking tips

Useful steps to Install Linux Mint on your PC

Guest Post by Oliver. Linux Mint is one of the most powerful and elegant Operating system. The purpose of launching a Linux Mint in the market is to provide the modern and comfortable OS which is easy to use for every user. The best thing about Linux Mint is that it is both free and Open Source. Also, it comes at the third position after Microsoft Windows an
Publish At:2016-11-19 20:55 | Read:8169 | Comments:0 | Tags:Articles Guides installation linux mint rosa

Are You Prepared for a Catastrophic Data Loss?

If you walked into the office this morning to find that your customer information had been compromised, or a disgruntled employee had wiped a database clean, would you be prepared? Have you set preventative measures in place to safeguard you against total loss? Do you have security features in place to help you retrieve lost data? Are you able to continue wi
Publish At:2016-11-19 20:55 | Read:6969 | Comments:0 | Tags:Articles backup computers Encryption security simple softwar

Why Smartphone Apps Will Help Home Automation Thrive

Guest post by Emma. Home automation technology has struggled to gain serious traction because, for all its promised convenience, the current tangle of cords and communication standards still has consumers in knots. New quote-unquote-smart systems have made huge strides recently, but not everyone has chosen invest – yet. Totally “smart” homes still await the
Publish At:2016-11-19 20:55 | Read:10955 | Comments:0 | Tags:Articles home automation operating systems smartphone Vivint

Paas and continuos integration

Today I want to repost a great article first posted on sysadvent blog. I think it’s a great post that show how to integrate different software to achieve a modern continuos integration. Original article by: Written by: Paul Czarkowski (@pczarkowski) Edited by: Dan Phrawzty (@phrawzty) Docker and the ecosystem around it have done some great things for d
Publish At:2016-11-19 20:55 | Read:7542 | Comments:0 | Tags:Articles Guides alias continuos integration ghost infrastruc

How Linux has Advanced Computer Technology and Everyone Wins as a Result

If you were to ask the average person about Linux, it’s likely you would get either a blank stare or a reply about an operating system that a bunch of anti-Microsoft geeks like to use. Both responses are unfortunate misconceptions. Linux has never been more in the mainstream than it is today, and it plays a very important role in advanced computing tec
Publish At:2016-01-23 08:45 | Read:6184 | Comments:0 | Tags:Articles Opinion internet of things linux


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud