HackDig : Dig high-quality web security articles for hacker

To Fight Cybercriminals, Follow the Money Trail

Follow the money! That is the famous first rule for investigating white collar criminal activity. It should also be the first rule for protecting your organization from a data breach, ransomware attack or other malicious activity. A basic fact of modern cybersecurity life is that the lone hacker of yore has long since vanished, replaced by sophisticated cy
Publish At:2017-08-01 18:05 | Read:440 | Comments:0 | Tags:Fraud Protection Network Cybercrime Cybercriminals Dark Web

Psychological Security: Helping Your Team Think Like Cybercriminals

Chance favors the prepared mind. That’s what famous chemist Louis Pasteur once said, but it’s also an important principle that applies to psychological security. Remember back in middle school when name-calling was a way we expressed our emotions? You’ll likely recall the common response: “It takes one to know one!” It Takes a
Publish At:2017-07-27 00:40 | Read:391 | Comments:0 | Tags:CISO Fraud Protection Cybercrime Cybercriminals Penetration

Cybercrime Has Become a Commodity

Today’s cybercriminals have new options that make their malicious efforts easier than ever. Cyberattacks can be purchased in several forms, including as-a-service packages and simple downloads to be installed in rogue servers. While these may not be the most cutting-edge techniques, they can be effective in infiltrating systems that have not been suff
Publish At:2017-05-24 00:45 | Read:689 | Comments:0 | Tags:Fraud Protection Network Advanced Threats Cybercrime Cybercr

Threat Intelligence in the Age of Cyber Warfare

The cyber age has brought incalculable advantages to modern life. The world is connected and accessible like never before. But like all technological advances, there is a dark side to this progress: Quite simply, the cyber age is revolutionizing warfare. Whereas security threats were once visible and easily identifiable, today’s cyberthreats are invi
Publish At:2017-05-05 20:20 | Read:617 | Comments:0 | Tags:CISO Risk Management Security Intelligence & Analytics Cyber

How much money earns cybercriminals? Mostly from $1,000 to $3,000, but …

According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month. How much money earns a cyber criminal? According to a report published by the threat intelligence firm Recorded Future crooks earn between $1,000 and $3,000 a month, but one of five earns $20,000 a month or more reaching also
Publish At:2016-12-01 12:25 | Read:1260 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking criminal undergro

Love the City You Live In? So do Cybercriminals!

Myth: There is no link between your real-life location and your digital one. The truth is that the two are very much connected. Perhaps more importantly, then, is what this means when it comes to your personal security. If the state or city in which you live is a hotbed for cybercriminal activity, your chances of being infected online increase significantly.
Publish At:2016-03-11 06:35 | Read:1027 | Comments:0 | Tags:Company Blog Cybercriminals cybersecurity hackers Infographi

Blind SQL Injection: The Last Handkerchief Up the Attacker’s Sleeve

For as long as SQL injection has been around, it is still not old news — at least for attackers. Attackers will take whatever path they can to reach an exploit The simpler the path, the better. However, sometimes they need to use a little more elbow grease. That’s where blind SQL injection comes in. If an attacker were a magician, this attack would be
Publish At:2016-01-19 16:25 | Read:1202 | Comments:0 | Tags:Vulns / Threats Cybercriminals IBM Managed Security Services

Eight Crazy Hacks: The Worst and Weirdest Data Breaches of 2015

2015 was a banner year for cybercriminals. And with less than a month left before the calendar rolls over, it’s worth taking a look back at the biggest, craziest and downright strangest hacks and data breaches of the last 11 months. Eight Crazy Hacks in 2015 In no particular order, here are eight of the biggest and strangest hacks from the past year: 1
Publish At:2015-12-09 23:55 | Read:795 | Comments:0 | Tags:Advanced Threats Ashley Madison Automobile Industry Cybercri

Economic Espionage: The Perfect Storm

Today’s CEOs, be they from large multinational enterprises or smaller shops, need to think about the effects economic espionage may have on their companies. Their own intellectual property, trade secrets and personnel are all of interest to others. In addition, data provided to and received from customers, clients and employees may prove to be the most
Publish At:2015-12-07 17:40 | Read:913 | Comments:0 | Tags:CISO Cyber Espionage Cybercrime Cybercriminals Organized Cri

Researching the Psychology of Hackers

Being the inspiration for “CSI: Cyber” is not likely an honor many people in the security field would be happy to claim. But this is exactly the tag line that cyberpsychologist Professor Mary Aiken is often given. As the director of the CyberPsychology Research Center (CPRC) in Dublin, she has an interesting viewpoint on cybercriminals and hacker
Publish At:2015-12-02 11:05 | Read:994 | Comments:0 | Tags:Threat Intelligence Cybercrime Cybercriminals DEF CON Human

Hacking Contests Drive Millennials to Cybersecurity

It’s no secret that the cybersecurity talent shortage is one of the biggest challenges facing our industry, with experts predicting 1.5 million open and unfilled global security positions over the next five years. Simple awareness of careers in this field is just the beginning; currently, almost two-thirds of high school students reported that the idea
Publish At:2015-11-12 21:25 | Read:1012 | Comments:0 | Tags:Security Intelligence & Analytics Cybercriminals Cybersecuri

The Myth of the Omnipotent Hacker

It’s not uncommon to see a hacker in a movie or a television show sitting in a dark basement, frantically typing as he or she simultaneously transfers money from the largest bank in the world, changes traffic lights from green to red to stop the good guys, raises the temperature on a nuclear core and turns off life support for a key character’s b
Publish At:2015-08-25 21:10 | Read:847 | Comments:0 | Tags:IBM X-Force Cybercriminals Dark Web Hackers IBM X-Force Exch

Taking Evasive Actions Against Cyberfraud

One of the interesting topics IBM teams analyze is the ways in which malware authors constantly innovate their cyberfraud techniques when it comes to evading detection either by endpoint solutions, such as antivirus tools, or research and enterprise security systems, such as sandboxes and reverse engineering techniques. Attacks involving Trojans are always i
Publish At:2015-04-21 20:10 | Read:1140 | Comments:0 | Tags:Fraud Protection Cyberattack Cybercriminals Cyberfraud Cyber

Security Excellence: How an IBM Threat Response Team Took On the Waski Virus

In the security industry, we tend to emphasize prescriptions. We invest a lot of time talking about technologies, methodologies and practices that build a strong security posture and threat response capability. What we don’t talk about much is people, as if the skills, motivation and commitment of those who plan, manage and — perhaps most important in
Publish At:2015-04-13 17:30 | Read:1157 | Comments:0 | Tags:Malware Cybercriminals Cybersecurity Security Intelligence T

Top Security Myths That Could Leave Your Organization Vulnerable to an Attack

Every year, thousands of companies evaluate their current security posture and implement solutions to help fill gaps in their security programs. The following are four security myths that may keep your organization from moving to a higher level of security: Myth: Your Company Is Not Infected Reality: Attackers Bypass Traditional Security Defenses Every Day Y
Publish At:2015-04-09 17:25 | Read:1029 | Comments:0 | Tags:Advanced Threats Application Security Cloud Cybercriminals C

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud