HackDig : Dig high-quality web security articles for hacker

7 Ways to Wreck a Cybercrook’s Holidays

’Tis the season for giving and who better to give a giant headache to than the digital scammers working overtime to wreck our holidays? Can we spot and unravel every scam out there? Probably not. But, by taking a few minutes to get equipped to click, we can dodge common traps laid by cybercrooks and wreck their holidays before they get a chance to wreck ours
Publish At:2019-12-06 16:45 | Read:241 | Comments:0 | Tags:Family Safety cybercrime identity theft malware computer sec

Here’s What You Need to Know About Your Data Privacy in 2020

The end of 2019 is rapidly approaching, and with the coming of a new year comes the perfect opportunity to reflect on the past and plan for the months ahead. What will 2020 bring when it comes to cybersecurity and what can users do to ensure that they’re protected in the upcoming year? From new data privacy laws to how organizations collect and store user da
Publish At:2019-12-06 16:45 | Read:100 | Comments:0 | Tags:Consumer Threat Notices computer security data protection in

Over 1 billion people’s data leaked in an unsecured server

Data enrichment companies are big business these days. They merge the data stored by other companies with third-party data in order for these companies to be able to take more informed decisions. Enriched data provides deeper insights into the companies’ customers, which allows them to adjust their business model so that it better adapts to their current or
Publish At:2019-12-05 10:35 | Read:72 | Comments:0 | Tags:Business News advanced cybersecurity data breach

Stalkerware developer dealt new blow by FTC

Last week, the US Federal Trade Commission (FTC) interpreted its broad consumer protection mandate to file a first-of-its-kind enforcement action against the developer of three mobile stalkerware applications. The developer was banned from further selling the apps unless significant changes were made in design and functionality. The FTC’s required change
Publish At:2019-11-11 23:20 | Read:267 | Comments:0 | Tags:Stalkerware Capital One consent agreement consent order data

A week in security (October 28 – November 3)

Last week on Malwarebytes Labs, we celebrated the birth of the Internet 50 years ago, highlighted reports about the US Federal Trade Commission (FTC) filing a case against stalkerware developer Retina-X, issued a PSI on disaster donation scams, looked at the top cybersecurity challenged SMBs face, and provided guidance to journalists on how they can defend t
Publish At:2019-11-11 23:20 | Read:173 | Comments:0 | Tags:A week in security Adobe Creative Cloud advanced persistent

The Evolution of Phishing: The Spear Is Aimed at You

You can’t go a week without seeing a story about a data breach or ransomware hitting organizations. These breaches can be very costly, but they still continue to show up. Are the good guys not winning the cybersecurity war? Organizations invest millions of dollars in security products and services, but they keep getting breached.We definitely have a skills g
Publish At:2019-10-18 10:10 | Read:386 | Comments:0 | Tags:Security Awareness data breach ransomware spear fishing

Cyber News Rundown: Data Dash

Reading Time: ~ 2 min. DoorDash Data Breach Nearly five months after a breach, DoorDash has just now discovered that unauthorized access to sensitive customer information has taken place. Among the stolen data were customer names, payment history, and contact info, as well as the last four digits of both customer payment cards and employee bank accounts.
Publish At:2019-10-04 16:10 | Read:509 | Comments:0 | Tags:Industry Intel data breach ransomware

5 Digitally-Rich Terms to Define, Discuss with Your Kids

Over the years, I’ve been the star of a number of sub-stellar parenting moments. More than once, I found myself reprimanding my kids for doing things that kids do — things I never stopped to teach them otherwise. Like the time I reprimanded my son for not thanking his friend’s mother properly before we left a birthday party. He was seven when his
Publish At:2019-09-28 23:20 | Read:703 | Comments:0 | Tags:Family Safety #BeCyberSmart #CyberAware Be Internet Awesome

What role does data destruction play in cybersecurity?

When organization leaders think about cybersecurity, it’s usually about which tools and practices they need to add to their stack—email protection, firewalls, network and endpoint security, employee awareness training, AI and machine-learning technology—you get the idea. What’s not often considered is which items should be taken away. Nearly
Publish At:2019-09-20 23:20 | Read:758 | Comments:0 | Tags:Business data data breach data destruction Data privacy dega

14 Million Customers Affected By Hostinger Breach: How to Secure Your Data

Whether you’re a small business owner or a blogger, having an accessible website is a must. That’s why many users look to web hosting companies so they can store the files necessary for their websites to function properly. One such company is Hostinger. This popular web, cloud, and virtual private server hosting provider and domain registrar boasts over 29 m
Publish At:2019-09-19 23:20 | Read:460 | Comments:0 | Tags:Consumer Threat Notices cybersecurity Data Breach data prote

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short answer to that question. The short answer is don’t
Publish At:2019-09-19 23:20 | Read:578 | Comments:0 | Tags:Family Safety BYOD cyberattack cybercrime cybersafety cybers

Attention Facebook Users: Here’s What You Need to Know About the Recent Breach

With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come tons of data, including some personal information that may now potentially be exposed. According to TechCrunch, a security researcher found an online database exposing 419 million user phone numbers linked to Facebook accounts. It appears
Publish At:2019-09-19 23:20 | Read:314 | Comments:0 | Tags:Consumer Threat Notices cybersecurity Data Breach data prote

3 Things You [Probably] Do Online Every Day that Jeopardize Your Family’s Privacy

Even though most of us are aware of the potential risks, we continue to journal and archive our daily lives online publically. It’s as if we just can’t help it. Our kids are just so darn cute, right? And, everyone else is doing it, so why not join the fun? One example of this has become the digital tradition of parents sharing first-day back-
Publish At:2019-09-19 23:20 | Read:460 | Comments:0 | Tags:Family Safety #CyberAware app safety computer security cyber

Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt

Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential car buyers don’t expect is to have their data exposed for all to see. But according to Threatpost, this story rings true for many prospective buyers. Over 198 million records containing personal, loan, and financial information on prospective car buyers
Publish At:2019-09-19 23:20 | Read:395 | Comments:0 | Tags:Consumer Threat Notices cybersecurity Data Breach data prote

Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know

I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas, I Venmo it. A Taco Bell study break with the roommates? No problem. With one click, I transfer money from my Venmo account to hers. She uses a Venmo credit card to make her purchase. To this mom, cash apps may be the best thing to happen to parenting
Publish At:2019-09-19 23:20 | Read:528 | Comments:0 | Tags:Family Safety app security Apple Pay Cash App cash apps cash

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud