HackDig : Dig high-quality web security articles for hackers

The best test for an EDR solution is one that works for you

Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the cyber landscape and meet customers’ needs for an effective and simple solution that just works. But finding something that just works means something quite different for every business, depending on their size, security expe
Publish At:2020-05-28 16:55 | Read:230 | Comments:0 | Tags:Awareness Explained Opinion Security world alert fatigue aut

Important tips for safe online shopping post COVID-19

As more and more countries order their citizens inside in response to COVID-19, online shopping—already a widespread practice—has surged in popularity, especially for practical items like hand sanitizer, groceries, and cleaning products. When people don’t feel safe outside, it’s only natural they’d prefer to shop as much as possible from the safety of
Publish At:2020-03-31 16:25 | Read:476 | Comments:0 | Tags:Awareness counterfeit online shopping padlock vpn web skimme

Child identity theft, part 2: How to reclaim your child’s identity

In a world where children as young as a single day old can fall prey to fraud, it is more important than ever to educate parents and other caretakers about the dangers of child identity theft. While the hope is that perceptions can be changed and criminals brought to justice, likely the biggest concern for parents is how to reclaim their child’s identi
Publish At:2020-03-17 13:08 | Read:511 | Comments:0 | Tags:Awareness child identity fraud child identity theft familiar

The effects of climate change on cybersecurity

Outside the coronavirus pandemic and its related healthcare and economic fallout, climate change and cybersecurity are seen by many as the two most urgent problems facing our planet now and in the near future. They are two distinct and separate problems, to be sure. There are some areas, however, where security and climate change overlap, interlock, and infl
Publish At:2020-03-13 18:05 | Read:692 | Comments:0 | Tags:Awareness climate change cooling cybersecurity datacenters e

Technology and the power of moral panic

Moral panic is a fascinating topic, and often finds itself tied up in the cutting edge-technology of the times once it works its way into the hands of younger generations. Music, games, movies—pretty much anything you can think of is liable to gatecrash the “won’t somebody think of the children?” party no matter how well-meaning or patently silly it is. Last
Publish At:2020-03-05 14:55 | Read:609 | Comments:0 | Tags:Awareness computer games cyber discord elvis hacking kali li

Child identity theft, part 1: On familiar fraud

In 2013, 19-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died. “What the hell were you thinking?” he screamed. He had just unearthed a credit card statement in her name that had run over its limit from a box of her mother’s paperwork. Betz-Hamilton reasoned that the statement m
Publish At:2020-03-03 17:24 | Read:785 | Comments:0 | Tags:Awareness child identity fraud child identity theft cyberbul

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

This post was co-authored by Wendy Zamora and Chris Boyd. All opinions expressed belong to your mom. Back in the days before climate change stretched frigid winter months directly into the insta-sweat of summer, there was a saying about March: in like a lamb, out like a lion. The same might be said about the last decade in cybersecurity fails. What kic
Publish At:2019-12-19 16:50 | Read:763 | Comments:0 | Tags:Awareness ashley madison ashley madison hack BadRabbit cambr

Report: Organizations remain vulnerable to increasing insider threats

The latest data breach at Capital One is a noteworthy incident not because it affected over 100 million customer records, 140,000 Social Security numbers (SSNs), and 80,000 linked bank accounts. Nor was it special because the hack was the result of a vulnerable firewall misconfiguration. Many still talk about this breach because a leak of this magnitude,
Publish At:2019-12-05 16:50 | Read:1143 | Comments:0 | Tags:Awareness Carnegie Mellon University cert insider threat cen

As Internet turns 50, more risks and possibilities emerge

This op-ed originally appeared in the San Francisco Chronicle on October 28, 2019. We occupy a richly-connected world. On the Internet, we collapse distance and shift time. But this Internet that delivers mail, connects us with friends, lets us work anywhere, and shop from the palm of the hand, is a mere 50 years old, slightly younger than Jennifer Anisto
Publish At:2019-11-11 23:20 | Read:756 | Comments:0 | Tags:Awareness arpanet dns domain domains history of the internet

When can we get rid of passwords for good?

Or perhaps I should have asked, “Can we ever get rid of passwords for good?” The security world knows passwords are a problem. Products ship with default passwords that are never changed. People reuse old passwords or adopt easy-to-guess passwords that hackers easily defeat via brute force. Or users simply can’t keep up with having to re
Publish At:2019-10-16 23:20 | Read:1156 | Comments:0 | Tags:Awareness 2fa authentication mfa passwords

Europol: Ransomware remains top threat in IOCTA report

The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report for the year. And we weren’t surprised to find that ransomware, despite its palpable decline in volume these past few months—a trend we’ve also seen and documented—remains the most prominent threat in terms
Publish At:2019-10-14 23:20 | Read:1190 | Comments:0 | Tags:Awareness bec Business Email Compromise child sexual exploit

5 Signs Your Cybersecurity Awareness Program Is Paying Off

Not too long ago, a client of ours who had just released a dynamic new cybersecurity awareness course told me how blown away he was with the response they were getting.His inbox was full of compliments, and his colleagues wanted to duplicate his training success in their own departments. He recounted how employees stopped him in the hallway to thank him for
Publish At:2017-03-29 01:05 | Read:6339 | Comments:0 | Tags:Featured Articles Security Awareness awareness cybersecurity

The Next Wave for Cybersecurity Awareness

The annual RSA Conference is a lot of things to a lot of people (43,000 this year!). For me, it’s become an annual opportunity to step out of the stream and to look back at what has happened in the last year and peer forward at what’s to come.This year, I think we have reached an inflection point around the way we as a profession treat the “human element,” a
Publish At:2017-02-27 10:30 | Read:5249 | Comments:0 | Tags:Security Awareness awareness information security

Sherlock Holmes for the InfoSec Crowd: 5 Steps to Becoming a Security Awareness Mastermind

The ever-fickle world of pop culture has seen a resurgence of interest in Sherlock Holmes in the last five years.Fresh re-imaginings of the detective residing at 221B Baker Street have come both to the big screen and small to varying degrees of critical acclaim. Robert Downey Jr.’s version premiered in 2009, while Benedict Cumberbatch’s modern interpretation
Publish At:2017-01-17 17:20 | Read:5053 | Comments:0 | Tags:Featured Articles Security Awareness awareness breach securi

Burgling From an OSINT Point of View

This is a more technology-based continuation of KGW Portland‘s story that it published discussing what 86 convicted burglars looked for in target selection. My aim is to add aspects of both Social Engineering and Open Source Intelligence (OSINT) into this to attempt to help raise awareness.The purpose behind the anonymous questionnaire, which was distr
Publish At:2016-11-17 14:50 | Read:5224 | Comments:0 | Tags:Featured Articles Security Awareness awareness OSINT social


Tag Cloud