HackDig : Dig high-quality web security articles for hacker

Locky ransomware strikes at Amazon

Locky is back! We’ve been closely monitoring the rebirth of the ransomware for quite some time. Since early last year, different variations of the ransomware have been periodically popping in and out. Last year we discussed the tricks of the malicious software and had a deeper look into how it works. As you may remember, the primary purpose of the malicious
Publish At:2017-09-22 06:05 | Read:102 | Comments:0 | Tags:Malware Mobile News cybersecurity Ransomware

Dangers Beyond Ransomware – the Risk of Spyware

There’s been a lot of talk recently about ransomware’s impact on the business environment. It would seem that the central role of this attack casts a shadow over one of the classic villains of cybersecurity: spyware. But a large percentage of today’s attacks suffered by companies today involve this malware. Its risks must not go neglected. Know your enemy On
Publish At:2017-09-15 08:00 | Read:174 | Comments:0 | Tags:Security b2b cybersecurity Spyware

Why is Online Voting Not a Good Idea?

Online voting could introduce great risk into the election system by threatening voters It’s the 21st century, and we are living in the future as technology is advancing at a rapid speed. It has never been easier to shop online and to do online banking. It is possible money will even cease to exist as blockchain digital currencies such as Bitcoin and Monero
Publish At:2017-09-12 06:15 | Read:197 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Panda Security and Deloitte Have Exciting Announcement for the Gartner Summit

Following the success of the Gartner Security & Risk Management Summit in the US, Panda Security will also be participating in the London conference held on 18-19 September 2017. The summit will address the major challenges facing IT security leaders today. Analysts, panellists, and presenters will offer proven practices, technologies and methods to help
Publish At:2017-09-11 11:50 | Read:218 | Comments:0 | Tags:Adaptive Defense business cybersecurity deloitte gartner

Hacker Interview – Jonturk 75 – JRB

Today I have the pleasure to interview Jonturk 75 one of the hackers that hit high profile targets, including the notorious hacker group OurMine. Jonturk 75 and the hacker group he takes part in have recently made the headlines news with a series of attacks against high profile targets. Following CNN and Reuters hacks they’ve recently defaced the web
Publish At:2017-09-08 14:30 | Read:201 | Comments:0 | Tags:Breaking News Hacking Cybersecurity Hacktivism Jonturk 75

Risk Governance: The True Secret Weapon of Cybersecurity

This season’s featured cybersecurity nightmare may be ransomware, but breaches of all kinds are going up in both numbers and cost. In response, security vendors are offering sophisticated — and costly — solutions to defend against evermore sophisticated attackers. However, the most effective protective measures have nothing to do with specific software
Publish At:2017-09-08 10:00 | Read:208 | Comments:0 | Tags:Risk Management Access Governance Access Management Cybercri

Equifax hit with a data breach possibly affecting half of the US population

This Thursday Equifax, one of the three major credit bureaus in the US, announced that cyber security incident involving consumer information of nearly half of the population in the US had been spotted on July 29th, 2017. In the press release published yesterday, they stated that based on their internal investigation the data breach began taking place in mid
Publish At:2017-09-08 05:50 | Read:182 | Comments:0 | Tags:Mobile News News companies cybersecurity urgent

Aiming for a Security Career? Consider a Liberal Arts Degree

“In the shifting landscape of higher education today, critical questions continue to be raised about the value of a liberal arts education. There is a constant drumbeat claiming that STEM subjects — science, technology, engineering and math — are far more valuable in today’s digital economy and culture than a traditional liberal arts major such a
Publish At:2017-09-07 15:10 | Read:64 | Comments:0 | Tags:CISO Academia Cybersecurity Cybersecurity Jobs Education Pro

Cyber Security Tips for Parents and Children

How to protect your children from cyber threats The summer just gracefully glanced over our lives, and now it is time for things to get back to normal – we will soon start feeling the cold breeze and the days will become shorter. Even though that the good old days of casual dress code in the office are now gone, being back to reality has some positives too.
Publish At:2017-09-05 17:15 | Read:218 | Comments:0 | Tags:Mobile News Tips cybersecurity passwords Privacy

Panda Security, leader in Gartner’s Peer Insights program

We’ve been warning for some time now that traditional antivirus solutions are no longer effective against the newer threats. Targeted and zero-day attacks, as well as the dreaded malwareless threats, are a growing concern for businesses. And not only that, we have also emphasized time and again the importance of preventing the losses and reputational d
Publish At:2017-09-04 22:45 | Read:84 | Comments:0 | Tags:Panda Security business cybersecurity gartner Products

Back to School with Cybersecurity on our Minds

The multitude of devices that have entered our lives over the past decade have also entered the classroom, and the security issues we face every day are just as real in the school as they are in our homes or businesses. Tablets, computers, even smartwatches can be useful educational tools, but the personal data that they store, belonging to students and teac
Publish At:2017-09-01 20:50 | Read:203 | Comments:0 | Tags:Tips b2b back to school cybersecurity

Interview with Herbert Lin: “Cybersecurity is a never-ending battle”

Herbert Lin is Senior Research Scholar of Cyber Policy and Security at Stanford University’s Center for International Security and Cooperation (CISAC). Lin is also a Hank J. Holland Fellow of Cyber Policy and Security at the Hoover Institution, a prestigious research center for public policy. In addition to working in cyber policy and security, Lin has a PhD
Publish At:2017-08-25 06:35 | Read:172 | Comments:0 | Tags:Interviews b2b cybersecurity interview

Board Directors Need to Get Involved With Cyber Risk Governance

Board directors are under a lot of pressure. They know that it’s only a matter of time before their organization suffers a cyber incident, and all eyes will naturally be on the directors themselves to see if they were properly exercising their risk oversight. Directors also know that all interactions with the CISO will be subject to close scrutiny in t
Publish At:2017-08-24 16:50 | Read:199 | Comments:0 | Tags:CISO Risk Management Cyber Risk Cybersecurity Cybersecurity

PlayStation Network Hacked. Again.

When mysterious tweets appeared on the official Sony PlayStation Twitter feed on Monday morning, it quickly became clear that the account had been hacked. Indeed, the hackers made little effort to hide their activities, proudly announcing that the breach had been carried out by the OurMine Security Group. Photo credit: Twitter Initially there were a few twee
Publish At:2017-08-23 14:50 | Read:275 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats

Even with security technology in place, companies know that it is not possible to prevent all cyberattacks. At any rate, however, the damages caused by attacks can be greatly mitigated with quick and decisive action in response to threats. The answer is to use a cybersecurity solution capable of monitoring, uninterruptedly, all applications in order to block
Publish At:2017-08-22 04:50 | Read:232 | Comments:0 | Tags:News Panda Security alliance cybersecurity deloitte

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud