HackDig : Dig high-quality web security articles

DDoS Protection is Plagued with Vulnerabilities

Approaching the halfway point of 2023, we can now determine that Q2 has seen a record of DDoS attacks, on virtually every vertical and industry. From banks and governments to telecom and shipping, many organizations were targeted and the number of successful DDoS attacks that caused severe downtime is alarming. DDoS attackers understand that even the best DD
Publish At:2023-05-25 06:50 | Read:84547 | Comments:0 | Tags:Blog Automated DDoS testing Cyber Attack Cyber Security cybe

DDoS Vs. Gaming: Lagging and Glitching

Distributed denial of service (DDoS) attacks are growing increasingly common across all industries, leaving many businesses scrambling for solutions to get back online fast. The gaming industry is not foreign to DDoS attacks. It was among the first industries targeted by DDoS when this attack method became common, back in the days when no protection solution
Publish At:2023-05-09 10:47 | Read:132719 | Comments:0 | Tags:Blog Automated DDoS testing Cyber Attack Cyber Security cybe

A Traveller’s Guide to Staying Cyber safe

With the massive increase in mobile device sales worldwide, it is easy to imagine that the number of people using the internet while travelling has also increased significantly in recent years. With this growth in online activity comes a greater risk of becoming a victim of cybercrime. There are a number of steps that travellers can take to protect themselve
Publish At:2022-09-20 23:55 | Read:515046 | Comments:0 | Tags:Cyber Security cyber safety cybersecurity Travel cyber

WhatsApp Scams in 2022: What to Look out for

WhatsApp is ranked as the most popular mobile messenger app in the world.  In fact, there are two billion active users on the app. This is an incredibly large audience. Unfortunately, it is also a huge number of potential victims for criminals to target. Cybercriminals are increasingly using WhatsApp as the medium for their attacks, and while people hav
Publish At:2022-09-06 01:13 | Read:875873 | Comments:0 | Tags:Cyber Security Featured Articles cybercrime Phishing scam Wh

Email and cybersecurity: Fraudsters are knocking

Can you remember your first email? Either sending one, or receiving it? I certainly remember explaining to people what email was, and I also remember someone telling me they could live without their email server for “about a month before it becomes a problem”.Can you imagine that now? A month without email?Emails are a necessary evilAccording to
Publish At:2022-08-22 00:31 | Read:734846 | Comments:0 | Tags:Cyber Security Featured Articles communication email email s

5 tips for spotting and avoiding Pig butchering scams

A new type of scam, called “pig butchering” is gaining momentum. Pig butchering is a unique scam which uses a romance scam script, but with an investment spin on it, where victims are groomed to invest large sums of money, often on fake crypto apps. Behind the scenes of these scams are scam centers run by cryptocurrency scammers, who coerce human trafficking
Publish At:2022-08-15 01:55 | Read:780217 | Comments:0 | Tags:Cyber Security Featured Articles cryptocurrency cybercrime f

3 Types of Network Attacks to Watch Out For

Cybersecurity is becoming more of a common term in today’s industry. It is being passed around executive meetings along with financial information and projected marketing strategies. Within the cybersecurity lexicon, there are some attack methods that are repeated enough to become part of a “common tongue”. These terms are infrastructure agnostic; it does no
Publish At:2022-08-10 06:20 | Read:418238 | Comments:0 | Tags:Cyber Security Vulnerability Management Access Attacks DoS n

Email Fraud in 2022: What you Need to Know

With how much of our personal and professional lives take place online, it becomes more important each day for us to understand our vulnerability to cyberattacks. Cybercriminals target emails, domains, and accounts in order to impersonate identities and scam consumers and businesses alike. In 2021 alone, email spoofing and phishing increased by 220% and caus
Publish At:2022-08-01 01:06 | Read:923393 | Comments:0 | Tags:Cyber Security Featured Articles cybercrime email email scam

Malware on IBM Power Systems: What You Need to Know

Malware – what are the threats?Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn your Power System into a ‘malware host’.The key target is your data. Data is valuable, and organisations have paid at least $602 million to ransomware ga
Publish At:2022-07-28 05:04 | Read:948787 | Comments:0 | Tags:Cyber Security Featured Articles IBM malware power systems p

More malware-infested apps found in the Google Play store

Three million Android users may have lost money and had their devices infected by spyware, after the discovery that the official Google Play store has been distributing apps infected by a new family of malware.French security researcher Maxime Ingrao described last week on Twitter how he had discovered the new malware, named “Autolycos”, and how
Publish At:2022-07-20 13:00 | Read:736101 | Comments:0 | Tags:Cyber Security Featured Articles Android Google App Store Go

10,000 organisations targeted by phishing attack that bypasses multi-factor authentication

Microsoft has shared details of a widespread phishing campaign that not only attempted to steal the passwords of targeted organisations, but was also capable of circumventing multi-factor authentication (MFA) defences.The attackers used AiTM (Attacker-in-The-Middle) reverse-proxy sites to pose as Office 365 login pages which requested MFA codes, and then use
Publish At:2022-07-14 13:00 | Read:704037 | Comments:0 | Tags:Cyber Security Featured Articles

Lockdown Mode: Apple to protect users from targeted spyware attacks

Apple has previewed a new feature which aims to harden high-risk users from the serious threat of being spied upon by enemy states and intelligence agencies.“Lockdown Mode” is scheduled to arrive later this year with the release of Apple iOS 16 and macOS Ventura. It’s an optional feature for users who believe their computers and smartphones
Publish At:2022-07-07 13:00 | Read:769495 | Comments:0 | Tags:Cyber Security Featured Articles Apple Authentication iPhone

How to Protect Your Remote Workforce from a Cyberattack

Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.In addition, there is a worldwide shortage of cybers
Publish At:2022-06-26 21:07 | Read:993688 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Remote working

Cyberthreat Defense Report 2022: Key Points You Should Know

Each year, CyberEdge publishes the Cyberthreat Defense Report (CDR). Aimed at IT security leaders, this comprehensive report outlines the threats, security issues, and industry concerns that are most pressing.Information summarized in the CDR is gathered through surveys conducted in 17 countries and 19 industries. Respondents are IT decision-makers in organi
Publish At:2022-06-20 02:14 | Read:516069 | Comments:0 | Tags:Cyber Security Featured Articles Cyberthreat Report cyber

Reexamining the “5 Laws of Cybersecurity”

Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The five laws are a very good start towards developing a robust security program. The laws are:Treat everything like it’s vulnerable.Assume peopl
Publish At:2022-06-20 02:14 | Read:492627 | Comments:0 | Tags:Cyber Security Featured Articles best practice cybersecurity


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud