HackDig : Dig high-quality web security articles for hackers

Free Cyber Safety Resources during COVID-19

Whether you are reading this from somewhere in the United States or overseas, chances are you are doing it from the comfort of your home. Not because you chose to but because you were asked to do so in order to prevent Coronavirus disease 2019 (COVID-19) from spreading any further.If you are a parent, working remotely with your kids at home, you are probably
Publish At:2020-03-24 09:22 | Read:507 | Comments:0 | Tags:Security Awareness COVID-19 Cyber Safety

Technology and the power of moral panic

Moral panic is a fascinating topic, and often finds itself tied up in the cutting edge-technology of the times once it works its way into the hands of younger generations. Music, games, movies—pretty much anything you can think of is liable to gatecrash the “won’t somebody think of the children?” party no matter how well-meaning or patently silly it is. Last
Publish At:2020-03-05 14:55 | Read:592 | Comments:0 | Tags:Awareness computer games cyber discord elvis hacking kali li

A week in security (November 4 – November 10)

Last week on Malwarebytes Labs, we announced the launch of Malwarebytes 4.0, tackled data privacy legislation, and explored some of the ways robocalls come gunning for your data and your money. We also laid out the steps involved in popular vendor email compromise attacks. Other cybersecurity news Bug bounty bonanza: Rockstar Games open up their bounty prog
Publish At:2019-11-11 23:20 | Read:1462 | Comments:0 | Tags:A week in security awis cyber facebook fake news hacking Mob

Just How Much Home Security Do You Need Right Now?

When it comes to home security, technology provides us with plenty of solutions for all needs and budgets. The problem is the same technology also provides burglars and perpetrators with the similar means of bypassing your fancy security systems. Long gone are the days when burglars would brutally force their way into your home with a lever. Now they can dis
Publish At:2016-12-12 05:05 | Read:15281 | Comments:0 | Tags:Featured Articles Internet of Things Cyber home security IoT

Women in Information Security: Zoё Rose

Women are eagerly needed in information security because we offer unique perspectives and there are so few of us.So far in this series, I interviewed Tiberius Hefflin, Tracy Maleef, Isly, Kat Sweet, and Jess Dodson–five different women from different parts of the English-speaking world and from different areas of IT.For my sixth and final interview, I
Publish At:2016-12-05 06:40 | Read:4733 | Comments:0 | Tags:Off Topic computing Cyber hacking Information Security Open

How to Approach Cyber Security for Industrial Control Systems

Today’s industrial control systems (ICS) face an array of digital threats. Two in particular stand out. On the one hand, digital attackers are increasingly targeting and succeeding in gaining unauthorized access to industrial organizations. Some actors use malware, while others resort to spear-phishing (or whaling) and other social engineering techniqu
Publish At:2016-11-14 12:05 | Read:3782 | Comments:0 | Tags:Featured Articles ICS Security controllers Cyber endpoints i

Defeating Cybercrime with Awareness and Good Habits

Information security is a growing problem even in the protected, static environment of the business office. The challenges of securely accessing and storing data while traveling, however, are particularly acute, but they are manageable with (1) a high-level of awareness coupled with (2) a few good habits.AwarenessForget about hackers in the movies, forget sc
Publish At:2016-10-12 14:25 | Read:4645 | Comments:0 | Tags:Cyber Security Featured Articles Brian Krebs Cyber Google Ad

Germany Readies Cyber Unit to Fight Terrorism on the Web

Germany has a message for terrorists who use the Internet to carry out their aims: “Your number is up.”Thomas de MazièreOn 11 August, Germany’s federal interior minister Thomas de Mazière announced the creation of Zentrale Stelle für Informationstechnik im Sicherheitsbereich (ZITiS), or “Central Office for Information in Security Sphe
Publish At:2016-08-15 17:45 | Read:3477 | Comments:0 | Tags:Latest Security News AlphaBay Cyber darknet Germany ISIS ter

Patients diverted to other hospitals after ransomware locks down key software

Hollywood Presbyterian Medical Center, a hospital in Los Angeles, is the victim of what officials describe as an ongoing cyberattack. A hospital spokesperson told Ars in a prepared statement that "patient care has not been affected" by the intrusion. And an executive of the hospital told reporters that the attack was "random" and not targeted at patient reco
Publish At:2016-02-17 22:55 | Read:5045 | Comments:0 | Tags:Risk Assessment crypto ransomware cyber

Protect Your Entire Digital Self

How much time do you spend at work?For some the answer is too much! No matter how much time you spend, I’m willing to guess that it’s an important part of your week. Your work is part of who you are, where you go, and what you do.That is why Cisco is proud to join the National Cybersecurity Alliance in its support of White House efforts to improve online sec
Publish At:2016-02-09 17:00 | Read:4597 | Comments:0 | Tags:Security 2FA connect cyber cybersecurity security Stop Think

Beware the Cyber Blind Spots

A blind spot is defined as “an area where a person’s view is obstructed.” As a longstanding professional in the industry, seeing the rhetoric change over the years, from Information Security, through Information Assurance and now to “cyber security,” what is occurring is the creation of a significant and worrying blind spot.Sadly, what people appear to
Publish At:2015-11-05 08:40 | Read:5037 | Comments:0 | Tags:Featured Articles Government Cyber cybercrime security UK

Cyberjargon and 100% Security

Cyberjargon and 100% Security Posted by David Harley on October 23, 2015.Further to the post Music, Security, and a Nice Cup of Tea, I just came across this very-much-to-the-point post by Kurt Wismer, specially for those of us who are thoroughly annoyed by the addition of the word R
Publish At:2015-10-23 07:55 | Read:5684 | Comments:0 | Tags:David Harley @cara_bones @imaguid cyber jargon Marcus Ranum

Filling the cyber skills gap

Filling the cyber skills gap Posted by Kevin on June 26, 2015.It’s one of those strange anomalies: there is a huge shortage of skills in cyber security and yet there are no jobs – at least not for the youngster fresh from school or college. Enthusiasm is not enough. Intelligence
Publish At:2015-06-26 08:35 | Read:5987 | Comments:0 | Tags:Expert Views Kevin Townsend's opinions cyber skills

A Comparative Analysis of National “Cyber” Security Strategies – Germany and the U.S.

 Last week, Tripwire published an article analyzing the ways in which the United States’ International Strategy for Cyberspace (ISC 2011) has informed the ideas outlined in the recently released 2015 National Security Strategy (U.S. NSS 2015).In my analysis, I compared both documents’ usage of the term “cyber” and found that while they vary somewhat in
Publish At:2015-03-11 23:45 | Read:4155 | Comments:0 | Tags:Featured Articles Government Cyber Germany United States

‘CSI: Cyber’ Riddled with Misperceptions, Lacks ‘Cyber’ Substance

 On March 4, the series premiere for the new crime drama CSI: Cyber aired on CBS. The show stars Patricia Arquette, who recently won an Oscar for Best Supporting Actress in a Supporting Role, as Avery Ryan, a behavioral analyst who solves crimes under the FBI Cyber Division. Peter MacNiol, Charley Koontz, Hayley Kiyoko, James Van Der Beek,and Shad Moss
Publish At:2015-03-06 15:35 | Read:4587 | Comments:0 | Tags:Off Topic CSI Cyber


Share high-quality web security related articles with you:)


Tag Cloud