HackDig : Dig high-quality web security articles

10 ways law firms can make life difficult for hackers

In the world of cybercrime, everybody from individuals to nation states is a target – some more attractive than others, of course. Health care organizations have gotten the most headlines recently, and the Internet of Things (IoT) offers an almost unlimited attack surface.But law firms are attractive too. They hold sensitive, confidential data ranging fr
Publish At:2016-05-19 04:20 | Read:700307 | Comments:0 | Tags:Data Protection Security Cyber Attacks/Espionage

Cybercriminal business model vulnerable to intervention

Cybercrime may be booming but its business model is vulnerable on many fronts, according to a new report."We've been observing that they've been acting like a business for a while," said Shogo Cottrell, security strategist at Hewlett Packard Enterprise, which produced the report.The profit motivation accounts for more than three-quarters of all data brea
Publish At:2016-05-17 15:50 | Read:372228 | Comments:0 | Tags:Investigations and Forensics Security Cyber Attacks/Espionag

Cybercriminals are increasingly embracing a sophisticated business-model approach

Cybercriminals can call on an extensive network of specialists for "business" expertise, including people who train and recruit, launder money, and provide escrow services, according to HPE.The cybercriminal underground includes people who provide human resources functions, like recruiting and background checks, but also specialists who help market and s
Publish At:2016-05-17 15:50 | Read:1192513 | Comments:0 | Tags:Security Cyber Attacks/Espionage

UK court declines to force alleged British hacker to decrypt his data

The U.K.'s National Crime Agency (NCA) failed in its attempt to use what critics described as a legal backdoor to force a suspected hacker to provide the decryption key for data on multiple devices.Lauri Love, 31, was arrested by U.K. authorities in 2013 under suspicion of hacking into computers belonging to multiple U.S. government agencies including NA
Publish At:2016-05-10 19:35 | Read:409506 | Comments:0 | Tags:Security Cyber Attacks/Espionage Legal

DDoS costs, damages on the rise

Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations in the U.S. and Europe.And for a third of respondents, the average peak hourly revenue loss was more than $250,000.However, shutting down attacks took time. Only 26 percent said i
Publish At:2016-05-05 11:50 | Read:1082947 | Comments:0 | Tags:Security Network Security Cyber Attacks/Espionage DDOS

How to tell if you've been hit by fake ransomware

Unlike most malware, ransomware is not stealthy. It's loud and obnoxious, and if you've been infected, the attackers will tell you so in no uncertain terms. After all, they want to be paid.“Your personal files are encrypted,” the message on the computer blares. “Your documents photos, databases, and other important files have been encrypted with stronges
Publish At:2016-04-29 09:50 | Read:727015 | Comments:0 | Tags:Security Malware Cyber Attacks/Espionage

Got ransomware? These tools may help

Your computer has been infected by ransomware. All those files -- personal documents, images, videos, and audio files -- are locked up and out of your reach.There may be a way to get those files back without paying a ransom. But first a couple of basic questions:Do you you have complete backups? If so, recovery is simply a matter of wiping the machine --
Publish At:2016-04-29 09:50 | Read:1012847 | Comments:0 | Tags:Security Malware Cyber Attacks/Espionage

Estonian man gets over 7 years in prison for role in global DNS hijacking botnet

An Estonian man has been sentenced to seven years and three months in prison in the U.S. for his role in a cybercriminal operation that infected over 4 million computers with DNS hijacking malware.Vladimir Tsastsin, 35, from Tartu, Estonia, was one of the key players in a US$14 million click fraud scheme. He is the sixth individual to be sentenced in the
Publish At:2016-04-28 15:35 | Read:390310 | Comments:0 | Tags:Security Malware Cyber Attacks/Espionage

ISIS cyberattack capabilities are unorganized, underfunded -- for now

The U.S. and its allies should be concerned about cyberattacks from ISIS-affiliated groups, but the hackers are poorly organized and likely underfunded, at least in the short term, according to a new report.Several pro-ISIS hacking groups announced this month they are joining together to form the United Cyber Caliphate, but the groups seem to have limite
Publish At:2016-04-28 15:35 | Read:552291 | Comments:0 | Tags:Security Cyber Attacks/Espionage

Empty DDoS threats earn extortion group over $100,000

Extorting money from companies under the threat of launching distributed denial-of-service attacks (DDoS) against their online properties has proven lucrative for cybercriminals. So much so that one group has managed to earn over $100,000 without any evidence that it's even capable of mounting attacks.Since early March, hundreds of businesses have receiv
Publish At:2016-04-27 03:05 | Read:342828 | Comments:0 | Tags:Security Networking Cyber Attacks/Espionage DDOS

Phishing emails leverage unique subject lines, Office docs

Phishing emails continued to evolve last year, according to a new report from PhishMe, with Microsoft Office documents and unique subject lines used to get past enterprise filters.Malicious Office macros have been around since the 1990s, said David MacKinnon, director of research at PhishMe, because there's little that companies can do to block them."Off
Publish At:2016-04-26 08:50 | Read:407740 | Comments:0 | Tags:Security Cyber Attacks/Espionage Data Breach Email

New security fabric to unite Fortinet gear with that of other vendors

Fortinet is embarking on a mission for some of its firewalls and other products and those of third-party vendors to work together to boost security across core networks, remote devices and the cloud.Called Fortinet Security Fabric, the architecture relies on direct communications inherent among certain of its own products (such as the FortiGate next-gene
Publish At:2016-04-25 14:35 | Read:312958 | Comments:0 | Tags:Security Software-Defined Networking Cloud Computing Cloud S

You’ve been hit with ransomware. Now what?

Imagine waking up to an urgent 5 a.m. call: Something has taken over your corporate network and encrypted all of your data, and supposedly the only way to get it all back is to pay a significant sum to an anonymous third party using Bitcoin. While that scene might sound like something out of Hollywood, it is actually very real – and it’s exactly what sev
Publish At:2016-04-21 19:20 | Read:404169 | Comments:0 | Tags:Security Data Breach Cyber Attacks/Espionage

8 cybersecurity technologies DHS is trying to commercialize

The Department of Homeland Security is publicizing eight new cybersecurity technologies developed under federal grants that are looking for private businesses to turn them into commercial products.In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS outlines the eight technologies that range from malware analysis tools to
Publish At:2016-04-16 11:35 | Read:374316 | Comments:0 | Tags:Security Cyber Attacks/Espionage

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen millions of dollars from customers of 24 U.S. and Canadian banks.The new threat has been dubbed GozNym by researchers from IBM X-Force because it combines the stealthy Nymaim malware and the Gozi banking Trojan.The new compu
Publish At:2016-04-16 11:35 | Read:380598 | Comments:0 | Tags:Security Malware Cyber Attacks/Espionage Fraud


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud