HackDig : Dig high-quality web security articles for hacker

WhatsApp spyware is being used to curtail the freedom of the press in India

In most cases malware is associated with theft. From keyloggers that collect passwords and credit card details to sophisticated tools for breaking into secure company networks, malware has many uses – mostly for committing crime. However, a new use has emerged in recent months – citizen surveillance. Political activists and journalists under investigation Me
Publish At:2019-11-15 09:15 | Read:177 | Comments:0 | Tags:Mobile News News Social Media cyberattacks Cybercrime WhatsA

SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath

Cyberattacks, many have noted, are the fastest growing economic crime not only in the United States, but also around the world. This upward trend has been observed since 2014, according to PricewaterhouseCoopers (PwC), and won’t likely be slowing down anytime soon. Cyberattacks—much like the advancement of technology, the interweaving of digital lives am
Publish At:2019-11-11 23:20 | Read:166 | Comments:0 | Tags:Business cyberattacks malware medium businesses Pricewaterho

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

The global average cost of a data breach is now $3.92 million — a 12 percent increase since 2014. Fortunately, the average cybersecurity budget is also increasing alongside breach cleanup costs. How to prioritize your budget is never a simple question. However, there’s a lot of insight to be gleaned from industry studies on how chief information secur
Publish At:2019-10-18 10:20 | Read:371 | Comments:0 | Tags:CISO Business Continuity Chief Executive Officer (CEO) Chief

How to Tell Safe Advertisements From Dangerous Malvertising

Advertising is the life blood of the internet. Some of the world’s biggest and most influential tech companies earn a large chunk of their revenue through harmless and safe advertisements, but some of the most successful cybercriminals also rely on advertising. When good ad networks are tricked into delivering malware, it’s known as malvertising.
Publish At:2019-10-18 10:20 | Read:255 | Comments:0 | Tags:Endpoint Fraud Protection Adware Artificial Intelligence (AI

Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise

Indicators of compromise (IoCs) are artifacts such as file hashes, domain names or IP addresses that indicate intrusion attempts or other malicious behavior. These indicators consist of: Observables — measurable events or stateful properties; and Indicators — observables with context, such as time range. IoCs are crucial for sharing threat information and
Publish At:2017-09-18 17:25 | Read:3480 | Comments:0 | Tags:Fraud Protection Incident Response Cyberattacks Incident Res

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:2362 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

Keyloggers: Be careful what you type

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking t
Publish At:2017-06-09 21:20 | Read:3305 | Comments:0 | Tags:Security companies cyberattacks keyloggers technology

Corporate Cybersecurity: Keep Up, or Die

Companies are more vulnerable than ever to cyberattacks, as their CIOs will be quick to explain to anyone who cares to ask. A third of them acknowledge that their company has suffered a major cyberattack in the last two years, an increase of 45% compared to 2013. And only one in five IT managers claims to be “very well prepared” to respond to cyb
Publish At:2017-06-06 19:40 | Read:2776 | Comments:0 | Tags:Security companies cyberattacks Cybercrime gdpr

Threat Intelligence in the Age of Cyber Warfare

The cyber age has brought incalculable advantages to modern life. The world is connected and accessible like never before. But like all technological advances, there is a dark side to this progress: Quite simply, the cyber age is revolutionizing warfare. Whereas security threats were once visible and easily identifiable, today’s cyberthreats are invi
Publish At:2017-05-05 20:20 | Read:3236 | Comments:0 | Tags:CISO Risk Management Security Intelligence & Analytics Cyber

The Cyberattack that Put an Entire City on High Alert

  As more and more pieces of our environment get connected to the Internet, the number of potential targets of a cyberattack becomes staggering, and the possible consequences become increasingly worrisome. Take what happened recently in Dallas, TX, where most of the city’s population was woken up in the middle of the night to the wailing of sirens becau
Publish At:2017-04-19 19:55 | Read:2698 | Comments:0 | Tags:News critical infrastructure cyberattacks Smart Cities

Attacks That Change the Course of History

Data theft is steadily refashioning itself as a political weapon. This past December, Barack Obama took advantage of his final days in office to take retaliatory measures against Russia. The Obama administration attributes to its Muscovite counterpart the cyberattacks carried out over the course of the recent presidential elections whose goal it was to tip t
Publish At:2017-01-09 13:20 | Read:3130 | Comments:0 | Tags:News cyberattacks security

Can a Hacker Guess Your Password in Only 100 Attempts?

Making sure that our employees use complex and diverse passwords, both in and out of the workplace, is of vital importance. Not least because multitudes of confidential data could be at risk because of flimsy credentials, ones that are obvious and oft-repeated. To demonstrate the necessity of adequate protection that also allows for the handling of many dist
Publish At:2016-12-29 16:55 | Read:2598 | Comments:0 | Tags:Security businesses cyberattacks passwords

66% of Organizations Unprepared to Recover from Cyberattack, Study Finds

Organizations around the globe remain unprepared to prevent, detect and respond to cyber attacks, revealed a recent study conducted by the Ponemon Institute.The 2016 Cyber Resilient Organization study surveyed over 2,400 security and IT professionals from the U.S., U.K., France, Germany, United Arab Emirates, Brazil and Australia.Of the respondents, 66 perce
Publish At:2016-11-22 05:30 | Read:3121 | Comments:0 | Tags:Latest Security News Cyberattacks Ponemon Institute resilien

Threat Recap: Week of May 16th

A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. TeslaCrypt Closing It’s Doors Here’s a bit of good ransomware news, for once. This week, it was brought to the attention of th
Publish At:2016-05-21 07:05 | Read:3878 | Comments:0 | Tags:Europe Headlines US Apple Breach Bug Bounty cyber attacks Cy

Loco Motives? Hacker Attacks Could Derail Train Cybersecurity, Researchers Say

It’s hard to argue with efficiency in tech or transportation. Despite the availability of air freight and commercial trucking services, trains stand out as both efficient and cost-effective when it comes to moving large quantities of material goods. According to SecurityWeek, however, the supervisory control and data acquisition network (SCADA) systems
Publish At:2016-01-12 21:40 | Read:3282 | Comments:0 | Tags:Advanced Threats Industries Cyberattacks Cybercrime Energy a


Share high-quality web security related articles with you:)


Tag Cloud