HackDig : Dig high-quality web security articles for hacker

Big Changes Around the Corner for the IoT

The Internet of Things (IoT) is a swamp that just doesn’t want to be drained. While there hasn’t been a huge alligator of a distributed denial-of-service (DDoS) attack in the last few months, it’s only a matter of time before a new one strikes. There are simply too many connected devices, many of which lack the built-in security to resist b
Publish At:2017-04-21 16:20 | Read:2876 | Comments:0 | Tags:Endpoint Network Connected Devices Infrastructure Infrastruc

The Sky Is the Limit: Assessing the IoT Impact on Businesses

The Internet of Things (IoT), in which all manner of devices and things are connected, is enabling digital transformation in many walks of life. It’s also heralding the promise that we will soon live in hyperefficient smart cities. But how does this affect business? A recent report from The Economist Intelligence Unit (EIU) gauged the current IoT impac
Publish At:2017-04-19 09:05 | Read:2696 | Comments:0 | Tags:Network & Endpoint Risk Management Connected Devices Connect

The IoT Is BYOD All Over Again

Internet of Things (IoT) devices are proliferating into unanticipated areas of businesses and personal lives. The explosion of IoT devices follows the familiar pattern of the bring-your-own-device (BYOD) movement, which has infiltrated the same spaces. What differentiates the two categories is the number of items and the cost of individual devices. But whil
Publish At:2017-04-17 20:15 | Read:2537 | Comments:0 | Tags:Mobile Security Network & Endpoint Bring-Your-Own-Device (BY

IoT: The Internet of Trouble

It might be surprising to note that the number of connected devices outgrew the world population back in 2008. By 2020, on average, each person on the planet will have about six devices. It’s fair to say that the Internet of Things (IoT) has already arrived, but what does this mean, and should you be concerned? Surfing the Tsunami of IoT Challenges Org
Publish At:2017-04-17 01:45 | Read:3303 | Comments:0 | Tags:Cognitive Network & Endpoint Cognitive Computing Cognitive S

Putting IoT Security Front and Center

The Internet of Things (IoT) is not just hype anymore. It is taking off at an enormous rate, and the predictions of 20 billion connected devices by 2020 now sound entirely likely. But as it takes off, so do IoT security challenges for both enterprises and consumers. Obstacles range from software updating issues to employee education and user privacy. But t
Publish At:2017-04-03 11:00 | Read:2662 | Comments:0 | Tags:Mobile Security Network & Endpoint Connected Devices Data Pr

Smart Forensics for the Internet of Things (IoT)

Interconnecting smart devices open companies, government agencies and individual consumers to a whole new world of useful applications. But while the Internet of Things (IoT) makes our day-to-day lives more convenient and dynamic, it also creates more opportunities for malicious actors to attack in ways that directly impact us. Today, discussions around IoT
Publish At:2017-03-23 16:56 | Read:2065 | Comments:0 | Tags:Network & Endpoint Risk Management Computer Forensics Connec

An IoT Love Story: Always Apart, Never Disconnected

An IoT Love Story This is the true story of when my personal life and my security research world collided. It’s also a love story, but it’s not really that mushy. Let’s start with the love story. I used to have a great convertible car. It brought me joy to cruise around Austin, wind blowing through my thinning hair and The Black Keys on the
Publish At:2017-02-18 05:50 | Read:3144 | Comments:0 | Tags:X-Force Research Connected Devices Internet of Things (IoT)

Voice Privacy in the Enterprise: Are You Listening?

Keyboarding is so last century. Whether we’re asking Amazon Echo how long it’ll take us to get to work, telling the TV to change channels or directing Siri summon a cab late on a Saturday night, voice control has made interacting with our devices a lot easier. As with all tech advances, however, those benefits are balanced out by some cons, which
Publish At:2017-02-07 11:30 | Read:2672 | Comments:0 | Tags:Security Intelligence & Analytics Connected Devices Internet

Is IoT Security an Oxymoron?

Last year’s cyberattack against internet provider Dyn was something of a milestone. For the first time in a large-scale campaign, the attackers didn’t go directly at their target’s servers. Instead, they pressed Mirai malware into service. This malware automatically discovers Internet of Things (IoT) devices and leverages poor IoT security,
Publish At:2017-02-02 20:55 | Read:2892 | Comments:0 | Tags:Identity & Access Mobile Security Network & Endpoint Botnet

IoT Security: Who Is Stepping Up?

The Internet of Things (IoT) is creating huge opportunities for businesses and society at large. Experts expect 30 billion connected devices to generate a market size of $1.7 trillion by 2020, according to an IDC infographic. With all this opportunity at risk, it is reasonable to ask why industry leaders haven’t done more to address the ever-increasing
Publish At:2017-01-04 09:35 | Read:3343 | Comments:0 | Tags:Application Security Government and Federal Industries Conne

2016: The Year of the DDoS Attack

Some malware incidents will go down in history. The IT industry remembers 2006, for example, as the year of Stuxnet, an infamous worm that drew public attention to the insecurity of supervisory control and data acquisition (SCADA) and programmable logic controller (PLC) systems. I’m quite sure that 2016 will be similarly defined as the year of the dist
Publish At:2016-12-16 21:05 | Read:2793 | Comments:0 | Tags:Energy and Utility Network & Endpoint Botnet Connected Devic

Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Most users take Bluetooth security for granted. When you’re enjoying the convenience of hands-free phone conversations, streaming podcasts in your car or jogging with your awesome new wireless headphones, do you need to worry about whether the communication channel is secure or not? What’s acceptable for consumers may not meet corporate standards
Publish At:2016-12-13 18:40 | Read:3059 | Comments:0 | Tags:Application Security Data Protection Bluetooth Connected Dev

Secure Your IoT Deployment by Paying Attention to These Four Factors

Once seen as just a utility to monitor and control a variety of devices, the Internet of Things (IoT) has become a reality. Devices available for IoT deployment range from household products like thermostats and garage door openers to units that control manufacturing systems and robotic devices. Unfortunately, many of these systems were designed without suff
Publish At:2016-12-13 18:40 | Read:4311 | Comments:0 | Tags:Cloud Security Data Protection Connected Devices Device Secu

Mirai Evolving: New Attack Reveals Use of Port 7547

When the source code for the Mirai botnet was made public in late September, a top concern was that bad actors might modify the code to increase the number of Internet of Things (IoT) devices they can compromise. It seems these fears have been realized. A few weeks ago, Reverse Engineering Blog disclosed a vulnerability in the Eir D1000 modem that could enab
Publish At:2016-12-01 11:20 | Read:4068 | Comments:0 | Tags:Threat Intelligence Vulns / Threats Advanced Threats Botnet

The InfoSecond, Week of Jan. 18: Hot Hacking Targets, Rovnix and More

Aaaaaaand we’re back, folks. Now that everyone’s had time to settle back into the swing of things and start off the year, we’ve got a brand new edition of the InfoSecond just for you. In this week’s entry, we’re examing hot hacking targets of 2016, exploring a new malware threat targeting the financial sector, delving into how t
Publish At:2016-01-17 10:10 | Read:3017 | Comments:0 | Tags:Malware Advanced Threats Banking Trojan Connected Devices Cy


Share high-quality web security related articles with you:)


Tag Cloud