HackDig : Dig high-quality web security articles for hackers

It’s Always DNS – But Not in the Way You May Think

A popular joke among technologists says that it’s always DNS, even when it initially didn’t seem that way. DNS issues come in many shapes and forms, including some often-overlooked security issues.DNS (short for the Domain Name System) continues to be described as “the phonebook of the Internet,” but many people, including most readers of this blog, will be
Publish At:2021-01-11 02:08 | Read:221 | Comments:0 | Tags:Cyber Security DNS Domain Name System HTTPS Network Security

Ghidra 101: Slice Highlighting

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively.In this post,
Publish At:2021-01-07 00:38 | Read:149 | Comments:0 | Tags:Cyber Security IT Security and Data Protection Ghidra slice

The 10 Most Common Website Security Attacks (and How to Protect Yourself)

Every website on the Internet is somewhat vulnerable to security attacks. The threats range from human errors to sophisticated attacks by coordinated cyber criminals.According to the Data Breach Investigations Report by Verizon, the primary motivation for cyber attackers is financial. Whether you run an eCommerce project or a simple small business website, t
Publish At:2020-12-21 03:02 | Read:237 | Comments:0 | Tags:Cyber Security Featured Articles threat web application atta

Ghidra 101: Cursor Text Highlighting

In this blog series, I will be putting the spotlight on useful Ghidra features that you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective while reverse engineering. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively.What is Cursor Text
Publish At:2020-12-08 03:02 | Read:233 | Comments:0 | Tags:Cyber Security Ghidra text highlighting

‘Scariest iPhone Hack Ever’ Illustrates Importance of Protecting Mobile Devices

It’s been called the ‘scariest iPhone hack ever.’ According to a recent Ars Technica article, “Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device – over Wi-Fi, with no user interaction required at a
Publish At:2020-12-04 10:21 | Read:168 | Comments:0 | Tags:Mobile Security advanced mobile threat defense cyber securit

How to Protect Your Business From Multi-Platform Malware Systems

The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown individuals. According to the United States Federal Bureau of Investigations, the group is a North Korean “state-sponsored hacking organization.”However, some believe that their connections to North Korea might be a false flag intending to hide the
Publish At:2020-12-03 02:08 | Read:239 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Lazarus malware

7 essential tips to stay safe shopping online, Cyber Week and all year

Shopping online can be a convenient way to get through your holiday shopping list, but just as in the physical world, there are precautions every online shopper should take to protect personal and financial information.For the most part, shopping online is safe—that is, if you use familiar, reputable websites. But sometimes in order to find that perfect gift
Publish At:2020-12-01 05:44 | Read:273 | Comments:0 | Tags:Security & Privacy Black Friday Cyber Monday cyber security

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible
Publish At:2020-11-30 00:02 | Read:287 | Comments:0 | Tags:Cyber Security Featured Articles IoT IoT security WiFi hack

Lessons From Teaching Cybersecurity: Week 8

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python ai
Publish At:2020-11-24 03:38 | Read:363 | Comments:0 | Tags:Cyber Security Featured Articles basics careers foundational

SEC’s Office of Compliance Inspection and Examinations Warns of a Sudden Increase in Credential Stuffing Hack

Recently, the Securities and Exchange Commission’s exam division issued a Risk Alert (the “Alert”) where it carried out several targeted cybersecurity investigations. The agency is now concerned with how there’s been an increase in a specific type of hack known as “credential stuffing.“This cyberattack involves using stolen credentials to log into web-based
Publish At:2020-11-16 00:37 | Read:291 | Comments:0 | Tags:Cyber Security Featured Articles credential stuffing Cyberat

Lessons from Teaching Cybersecurity: Week 6

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python ai
Publish At:2020-11-09 12:37 | Read:339 | Comments:0 | Tags:Cyber Security teaching toolkit tools training security cybe

5 Lessons Learnt from BJJ that Are Applicable to Cybersecurity

Over the last decade, I have focused quite heavily on technology and the cybersecurity space. I’ve been motivated to create a world that is more inclusive and safer. In 2019, I began a bit of a different journey. Whilst still motivated in a security point of view, this time, I focused on the physical side by beginning to train in Brazilian Jiu-Jitsu (B
Publish At:2020-11-02 01:13 | Read:375 | Comments:0 | Tags:Cyber Security Guidelines lessons policy security cyber cybe

How to Spot and Stop Popular Online Shopping Scams this Shopping Season

How to Spot and Stop Popular Online Shopping Scams this Shopping Season November 1st, 2020 No Comments anti-phishing, Data Privacy, Data Protection, Holidays, Online Privacy, PC security With COVID-19 keeping stores closed and people at home all aro
Publish At:2020-11-01 12:29 | Read:778 | Comments:0 | Tags:anti-phishing Data Privacy Data Protection Holidays Online P

5 Essential Steps to Improve Cybersecurity Maturity

From small- and medium-sized organizations to large enterprises, every business is under continuous threat of security risk in today’s digital world.With the growing digital footprint and cloud adoption, organizations continue to experience sophisticated cyberthreats that hold the potential to disrupt business continuity.A vast majority of these threats can
Publish At:2020-10-28 23:43 | Read:345 | Comments:0 | Tags:Cyber Security Featured Articles Automation cybersecurity aw

Top 5 Mobile Security Stories of a Crazy 2020

2020 has been crazy… to say the least.  But in many ways, 2020 has thrust a huge spotlight on something we’ve known for quite some time – – mobile threats are real and mobile devices and apps need protection. It truly is crazy how many stories we’ve seen – and the year isn’t over yet – where the need for mobile security is front and
Publish At:2020-10-22 12:44 | Read:432 | Comments:0 | Tags:Mobile Security advanced mobile threat defense Android apps

Tools

Tag Cloud