HackDig : Dig high-quality web security articles

10 Database Security Best Practices You Should Know

According to Risk Based Security’s 2020 Q3 report, around 36 billion records were compromised between January and September 2020. While this result is quite staggering, it also sends a clear message of the need for effective database security measures.Database security measures are a bit different from website security practices. The former involve physical
Publish At:2021-02-25 02:26 | Read:358 | Comments:0 | Tags:Featured Articles Authentication data safety database securi

The importance of computer identity in network communications: how to protect it and prevent its theft

The importance of computer identity in network communications: how to protect it and prevent threat actors from spying or stealing on online communications When you fill out a registration form to take advantage of a web service, a virtual personal profile is generated, creating your own IT identity characterized by specific attributes. Even those who
Publish At:2020-12-09 06:42 | Read:593 | Comments:0 | Tags:Breaking News Digital ID authentication authorization comput

A WebLogic Vulnerability Highlights the Path-Based Authorization Dilemma

A WebLogic server vulnerability fixed by the October CPU has come under active exploitation after a Vietnamese language blog post detailed the steps needed to bypass authentication and achieve remote code execution on unpatched systems. Although there have been a series of actively exploited WebLogic deserialization bugs, the exploit payload in this case imm
Publish At:2020-11-02 12:55 | Read:547 | Comments:0 | Tags:VERT Authentication exploits vulnerability WebLogic Vulnerab

Great news, now you can protect your Zoom account with 2FA

Zoom has implemented two-factor authentication (2FA) to protect all user accounts against security breaches and other cyber attacks. Zoom has announced finally implemented the two-factor authentication (2FA) to protect all user accounts from unauthorized accesses. This is a great news due to the spike in the popularity of the communication software dur
Publish At:2020-09-11 11:00 | Read:777 | Comments:0 | Tags:Breaking News Security 2FA authentication Hacking Identity T

Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus

With 316 million Americans being asked to stay at home during the COVID-19 pandemic and nearly half of the U.S. population still working from home, video conferencing has suddenly become a critical tool for businesses. In fact, tools for remote work have spiked 84 percent since February, with video conferencing platforms like Webex recently sharing that they
Publish At:2020-06-01 07:09 | Read:1334 | Comments:0 | Tags:Threat Research remote workforce Access Management Authentic

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been around since the 1990s, and it has served us well. Users have sent countless messages, and these exchanges have facilitated such developments as SMS-based two-factor authentication (2FA) and Kenya’s SMS-based M-Pesa mobile payment system. But the world has since discovered countless other ways to message — methods that enable far more
Publish At:2020-03-03 09:50 | Read:1455 | Comments:0 | Tags:Mobile Security Artificial Intelligence (AI) Authentication

Workforce Versus Consumer IAM: Key Differences and Use Cases

As a consumer, have you ever visited an online retail site only to be bombarded by a pop-up window asking for your email address in order to get a nominal discount? Or consider the process of exploring a home mortgage with a major financial institution. Your first interaction with the bank or financial institution prompts a request for your Social Security i
Publish At:2020-03-02 08:32 | Read:1277 | Comments:0 | Tags:Identity & Access Security Services Access Management Authen

Will Weak Passwords Doom the Internet of Things (IoT)?

Weak passwords can hurt any organization’s security efforts and make any device easily hackable, but could they also be the greatest point of failure for internet of things (IoT) security? Weak passwords certainly put companies deploying IoT devices at greater risk of falling victim to a cyberattack. We have already begun to see attacks targeting IoT d
Publish At:2020-02-15 17:18 | Read:1355 | Comments:0 | Tags:Endpoint Risk Management IoT Authentication Connected Device

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence (AI) isn’t new. What is new is the growing ubiquity of AI in large organizations. In fact, by the end of this year, I believe nearly every type of large organization will find AI-based cybersecurity tools indispensable. Artificial intelligence is many things to many people. One fairly neutral definition is that it’s a bran
Publish At:2020-02-09 10:30 | Read:1658 | Comments:0 | Tags:Artificial Intelligence Data Protection Identity & Access di

How Authentication and Identification Work Together to Build Digital Trust

The dictionary definition of trust, according to Merriam-Webster, is the “assured reliance on the … truth of someone or something.” In today’s digital world, trust can be a tricky concept. To do business online, whether you are a bank, retailer, insurer, airline or anything else, you must have some degree of trust in your user — trust
Publish At:2019-10-18 10:20 | Read:2028 | Comments:0 | Tags:Fraud Protection Identity & Access Access Governance digital

Will the Future of Authentication Run Into a Privacy Wall?

Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it is worth looking at the past to see what future challenges we may face in the digital identity space. From Jew
Publish At:2019-10-18 10:20 | Read:2063 | Comments:0 | Tags:Identity & Access Risk Management Artificial Intelligence (A

When can we get rid of passwords for good?

Or perhaps I should have asked, “Can we ever get rid of passwords for good?” The security world knows passwords are a problem. Products ship with default passwords that are never changed. People reuse old passwords or adopt easy-to-guess passwords that hackers easily defeat via brute force. Or users simply can’t keep up with having to re
Publish At:2019-10-16 23:20 | Read:1932 | Comments:0 | Tags:Awareness 2fa authentication mfa passwords

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducin
Publish At:2017-11-04 02:00 | Read:5255 | Comments:0 | Tags:Mobile Security Apple Authentication Biometric Mobile Securi

Credentials (UN)Management in home banking.

Introduction Out of the five main information security pillars, namely confidentiality, integrity, availability, authenticity and irrefutability, common users give more attention to the first one. But in real life even though in general people agree with the importance of backup, not many actually implement this security mechanism. What one says and what one
Publish At:2017-10-25 07:50 | Read:5807 | Comments:0 | Tags:Breaking News Hacking authentication banking

APNIC Whois-related problem led to accidental exposure of authentication data

APNIC Deputy Director General Sanjaya confirmed that Whois data were accidentally exposed online included authentication details. The Asia-Pacific Network Information Centre (APNIC) is a non-profit organization that provides Internet addressing services in the Asia-Pacific region. The APNIC made the headlines because it was informed about a Whois-related sec
Publish At:2017-10-24 13:20 | Read:5644 | Comments:0 | Tags:Breaking News Data Breach APNIC authentication data breach d