HackDig : Dig high-quality web security articles for hacker

“Eye Pyramid”, the Cyber-Espionage Malware that has Italy Reeling

This Tuesday, the Italian state police dismantled a cyber-espionage ring spearheaded by a brother and sister that sought to exert control over public institutions and administrations, professional studios, employers, and politicians. The network was able to access confidential information by installing a virus on victims’ computers, stealing information sens
Publish At:2017-01-12 01:25 | Read:2366 | Comments:0 | Tags:News Cyber-espionage cyberattack eye pyramid highlighted

OPM breach included five times more stolen fingerprints

The Office of Personnel Management's press secretary, Sam Schumach, announced this morning that the breach of OPM background investigation data included approximately 5.6 million sets of fingerprints from federal employees, contractors, and other subjects of federal background checks. The new number, tied to the discovery of additional archived data that was
Publish At:2015-09-24 02:00 | Read:3239 | Comments:0 | Tags:Law & Disorder Risk Assessment breach cyber-espionage Federa

Security tools that are safe from the NSA

U.S. Intelligence services have shown on numerous occasions how adept they are at accessing our data without permission. Nevertheless, there is still hope that you can keep your confidential information safe from the prying eyes of the NSA: Its expert spies still haven’t been able to crack all encryption systems.Encryption tools are frequently used to safegu
Publish At:2015-01-26 19:55 | Read:2874 | Comments:0 | Tags:Internet Security Cyber-espionage

Cyberespionage: ‘This Isn’t a Problem That Can Be Solved’

WASHINGTON–Gentlemen may not read each other’s mail, as Henry Stimson famously said so long ago, but in today’s world they certainly steal it and there’s precious little in the way of gentlemanly conduct happening in the realm of cyberespionage. It’s every man—or country—for himself in this environment, and that free-for-all is
Publish At:2014-10-29 19:15 | Read:2037 | Comments:0 | Tags:Critical Infrastructure Government Hacks Web Security critic


Share high-quality web security related articles with you:)


Tag Cloud