HackDig : Dig high-quality web security articles for hackers

Protecting your Devices’ Mic from Hackers

Protecting your Devices’ Mic from Hackers August 10th, 2020 No Comments antivirus, Data Privacy, Mobile Security, Online Privacy Eavesdropping. It used to be something we did to people who shared the same space with us before text messages was a thi
Publish At:2020-08-10 15:12 | Read:204 | Comments:0 | Tags:antivirus Data Privacy Mobile Security Online Privacy

Data Accountability and Transparency Act of 2020 looks beyond consent

In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t have to be. In June, Democratic Senator Sherrod Brown of Ohio released a discussion draft of a new data privacy bill to improve Americans’ data privacy rights and their relationship with the countless companies that collect, store
Publish At:2020-08-06 04:45 | Read:159 | Comments:0 | Tags:Privacy consent Data Accountability and Transparency Act Dat

Can My Webcam Be Accessed Remotely?

Can My Webcam Be Accessed Remotely? July 28th, 2020 No Comments antivirus, Data Privacy, Data Protection, Online Privacy, Uncategorized With the huge increase of people working from home due to Covid-19, millions of home laptops and desktops are lay
Publish At:2020-07-28 16:14 | Read:150 | Comments:0 | Tags:antivirus Data Privacy Data Protection Online Privacy Uncate

Sextortion: All You Need to Know

Sextortion: All You Need to Know July 14th, 2020 No Comments anti-phishing, Data Privacy, Data Protection, Mobile Security, Online Privacy, Online Safety, Ransomware, Uncategorized Sextortion – a portmanteau of the words sex and extortion – is a bro
Publish At:2020-07-14 15:45 | Read:345 | Comments:0 | Tags:anti-phishing Data Privacy Data Protection Mobile Security O

Video Conferencing Security Tips You May Have Overlooked

Video conferencing applications grew substantially following the outbreak of the coronavirus (COVID-19) global pandemic. According to Research and Markets article “Video Conferencing Demand Rises due to Social-Distancing,” video conferencing software experienced 62 million downloads in March 2020. This increase in use resulted from businesses ado
Publish At:2020-07-08 10:58 | Read:177 | Comments:0 | Tags:Data Protection Risk Management Software & App Vulnerabiliti

Cyber Crimes on 4th of July Amid Corona Times

Cyber Crimes on 4th of July Amid Corona Times July 3rd, 2020 No Comments antivirus, Data Privacy, Data Protection, Mobile Security, Online Privacy, Online Safety, PC security, remote work It’s clear to everyone that we are living in unprecedented ti
Publish At:2020-07-03 10:06 | Read:507 | Comments:0 | Tags:antivirus Data Privacy Data Protection Mobile Security Onlin

The Security Risks of Contactless Payment

Contactless payment first arrived in the 1990s and is now having its moment. Both companies and consumers are looking for ways to conduct business with as little physical interaction as possible during in-person transactions. We’ve been building to this moment, if you think about it. Organizations have been steadily increasing reliance on digital optio
Publish At:2020-06-26 09:25 | Read:276 | Comments:0 | Tags:Banking & Financial Services Data Protection Mobile Security

Best Practices for Managing Data Privacy & Responding to Privacy Breaches

A constantly changing regulatory environment has become the “new normal” for data privacy, and 2020 is no exception. The California Consumer Privacy Act (CCPA) went into effect in January and introduced one of the most sweeping requirements the U.S. has seen at a state level. In addition, the global health crisis has seen concerns around new and emerging use
Publish At:2020-06-18 12:15 | Read:230 | Comments:0 | Tags:Data Protection Risk Management Data Breach Data Privacy Dat

Dozens of Malicious Mobile Apps Discovered on Android Devices, Many Aimed at Children

Dozens of Malicious Mobile Apps Discovered on Android Devices, Many Aimed at Children June 18th, 2020 No Comments Data Privacy, Data Protection, Mobile Security Researchers from Check Point, ZoneAlarm’s parent company recently discovered 56 apps dow
Publish At:2020-06-17 18:50 | Read:362 | Comments:0 | Tags:Data Privacy Data Protection Mobile Security

Contact Tracing: De-mystifying How an App Designed to Track People Can Ensure User Privacy and Security

Many governments in many countries around the world recognise that contact tracing plays a very important part to reduce the spread of the deadly disease, COVID-19. In this article, we take a look at the conventional method of contact tracking and comparing it against how technology helps contact tracing and its pro’s and con’s.Traditional contact tracing is
Publish At:2020-06-02 06:01 | Read:312 | Comments:0 | Tags:Healthcare Contact Tracing COVID-19 data privacy encryption

Observing a Privacy Milestone: Expert Thoughts on GDPR’s 2nd Anniversary

May 25, 2020 marks the second anniversary of when the European Union’s General Data Protection Regulation (GDPR) took full effect. Undoubtedly, many organizations have succeeded in achieving compliance with the Regulation by now. But that raises some important questions.What benefits have those organizations experienced in achieving compliance, for instance?
Publish At:2020-05-25 01:18 | Read:320 | Comments:0 | Tags:Featured Articles Regulatory Compliance data privacy data pr

Introducing Malwarebytes Privacy

Here at Malwarebytes, we’re no strangers to using virtual private networks (VPNs) to protect our privacy while browsing online. Regular readers of our blog will remember that we’ve advised on VPN usage on many occasions, whether for mobile device users looking for anonymity or business owners wanting additional authentication protocols. We believe VPNs are a
Publish At:2020-05-03 14:39 | Read:456 | Comments:0 | Tags:Malwarebytes news Data privacy encryption IP address Malware

Cloud data protection: how to secure what you store in the cloud

The cloud has become the standard for data storage. Just a few years ago, individuals and businesses pondered whether or not they should move to the cloud. This is now a question of the past. Today, the question isn’t whether to adopt cloud storage but rather how. Despite its rapid pace of adoption, there are some lingering concerns around cloud sto
Publish At:2020-05-03 14:39 | Read:522 | Comments:0 | Tags:How-tos cloud cloud data cloud data protection cloud securit

Achieve Flexibility in Business Through Digital Trust and Risk Management

I grew up watching professional football back in the 70s, when defenses were so good they had their own nicknames. The Pittsburgh Steelers had the “Steel Curtain,” the Miami Dolphins had the “No-Name Defense” and the Dallas Cowboys had the “Doomsday Defense.” The Cowboys’ defense was based on a newfangled concept cal
Publish At:2020-04-21 10:39 | Read:694 | Comments:0 | Tags:CISO digital trust Business Continuity Customer Experience D

Mass surveillance alone will not save us from coronavirus

As the pattern-shattering truth of our new lives drains heavy—as coronavirus rends routines, raids our wellbeing, and whiplashes us between anxiety and fear—we should not look to mass digital surveillance to bring us back to normal. Already, governments have cast vast digital nets. South Koreans are tracked through GPS location history, credit card trans
Publish At:2020-04-15 18:12 | Read:1172 | Comments:0 | Tags:Opinion Apple Austria bluetooth Bluetooth contact tracing Bl

Tools

Tag Cloud