HackDig : Dig high-quality web security articles for hacker

Chinese Hackers Reportedly Target Belgian Trade Mission

A recent Belgian economic mission to China was reportedly a target of multiple cyberattacks. According to multiple news reports, attacks were carried out at a hotel in Beijing where the convoy was staying. Hackers placed three mobile masts around the hotel to which all connections go, and targeted smartphones with the Bluetooth function turned on.  This att
Publish At:2019-11-25 19:10 | Read:253 | Comments:0 | Tags:News cyber security mobile devices

Zimperium and Google Partner to Fight Bad Apps through App Defense Alliance

We are thrilled to announce Google has selected us to help ensure the safety of the millions of apps in the Google Play Store through its App Defense Alliance.    As a member of the App Defense Alliance, Google will provide us access to mobile apps as they are being queued to publish in the Google Play Store. Through our advanced machine learning-based z9 t
Publish At:2019-11-12 00:25 | Read:224 | Comments:0 | Tags:Android Machine Learning Mobile Malware Mobile Security News

Protecting Your Mobile Devices with Workspace ONE and Zimperium MTD

In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium has partnered with the leading UEM (unified endpoint management) providers, including VMware’s Workspace ONE, to deliver sophisticated threat protection for mobile devices. We are able to detect threats and work with UEMs to remediate risks and
Publish At:2019-10-23 07:50 | Read:337 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Top Three Mobile Phishing Lures: #2) Malicious Apps

People are slowly learning to be careful about providing their credentials when prompted by an email or phone call, but hackers are getting more creative and tricking users into giving their credentials when users think they’re just signing into their mobile app.  For example, BankBot is Android-targeting malware using fake overlay screens to mimic existing
Publish At:2019-10-09 07:50 | Read:333 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Top Three Mobile Phishing Lures: #1) Email

According to a SecurityWeek article, “With over 66% of emails first opened on a mobile device and email arguably the first point of attack for a phishing actor, unprotected emails on a mobile device can easily turn into a new avenue for attack.”  Furthermore, it’s not just corporate email that you have to worry about. Users check their personal emails from
Publish At:2019-10-02 07:50 | Read:451 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment of
Publish At:2019-09-19 14:33 | Read:393 | Comments:0 | Tags:Android App Security iOS Mobile Malware Mobile Security Mobi

The Bad, The Ugly & The Good of Mobile Phishing Protection

“The good, the bad and the ugly” is a well-known expression, but when it comes to mobile phishing, I suggest shifting the order. Let’s talk about the bad, the ugly and the good. The Bad: Mobile Takes Phishing from Bad to Worse Phishing is one of the most dominant attack techniques in cyber security.  Phishing has a very low barrier of entry, attacks can be
Publish At:2019-09-19 14:33 | Read:353 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Security Affairs newsletter Round 135 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again thank you! IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsats SATCOM systems Matrix Ransomware being distributed through malvertising Security Affairs newsletter Round 134 – News of the week Hash
Publish At:2017-11-05 16:20 | Read:3972 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Security Affairs newsletter Round 134 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again thank you! ·      A leaked document raises a doubt about NSA knew the #Krack attack since 2010 ·      APT28 group is rushing to exploit recent CVE-2017-11292 Flash 0-Day before users apply the patches ·      DHS and FBI warn of ong
Publish At:2017-10-29 22:20 | Read:2090 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Security Affairs newsletter Round 133 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again thank you! ·      ENISA – CTI – EU | Bonding EU Cyber Threat Intelligence ·      Flaws in Siemens Building Automation Controllers open to hack. Fix them asap ·      Hacker interview – Speaking with ICEMAN: Banks holes like in Chees
Publish At:2017-10-23 00:30 | Read:2945 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Securing smart grid and advanced metering infrastructure

The year is 2020, high economic, military and cultural tension between Russia & the US. You are at the London office, entering a video meeting with the sales team in America, the American team presents with enthusiasm the sales achievement of the recent quarter, then, suddenly the call is disconnected. You are trying to re-establish the connection with n
Publish At:2017-10-06 11:30 | Read:3709 | Comments:0 | Tags:Breaking News Security critical infrastructure cyber securit

Security Affairs newsletter Round 130 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again thank you! ·      Authors of Locky Ransomware are big fans Game of Thrones series ·      Massive HerbaLife spam campaign spreads a variant of Locky ransomware ·      Passwords and much more for 540,000 SVR Tracking accounts leaked
Publish At:2017-10-01 20:55 | Read:2485 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Security Affairs newsletter Round 129 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again thank you! ·      400,000 UK consumers at risk after the Equifax data breach ·      Chrome will label Resources delivered via FTP as Not Secure ·      MAGENTO 2.0.16 and 2.1.9 security update fixes critical flaw in the platform ·
Publish At:2017-09-24 22:05 | Read:2808 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Security Affairs newsletter Round 128 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Crooks leverage Facebook CDN servers to bypass security solutions ·      Mexican tax refund MoneyBack site exposed 400GB of sensitive customer data ·      Security Affairs newsletter Round 127 – News of the week ·      Apache Foundat
Publish At:2017-09-18 00:05 | Read:2313 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Security Affairs newsletter Round 127 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      FICO reports a 39 Percent Rise in Debit Cards Compromised in US ·      Google removed almost 300 Android apps involved in DDoS attack ·      Security Affairs newsletter Round 126 – News of the week ·      US Government website was ho
Publish At:2017-09-11 01:35 | Read:2227 | Comments:0 | Tags:Breaking News cyber security Newsletter Security Affairs

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud