HackDig : Dig high-quality web security articles for hacker

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

This post was co-authored by Wendy Zamora and Chris Boyd. All opinions expressed belong to your mom. Back in the days before climate change stretched frigid winter months directly into the insta-sweat of summer, there was a saying about March: in like a lamb, out like a lion. The same might be said about the last decade in cybersecurity fails. What kic
Publish At:2019-12-19 16:50 | Read:485 | Comments:0 | Tags:Awareness ashley madison ashley madison hack BadRabbit cambr

Emotet malspam campaign uses Snowden’s new book as lure

Exactly one week ago, Emotet, one of the most dangerous threats to organizations in the last year, resumed its malicious spam campaigns after several months of inactivity. Based on our telemetry, we can see that the botnet started becoming chatty with its command and control servers (C2), about a week or so before the spam came through. Figure 1: Communic
Publish At:2019-09-23 23:25 | Read:1014 | Comments:0 | Tags:Botnets botnet botnets Edward Snowden emotet macros malspam

The Justice Department is suing Edward Snowden over a book

Edward Snowden, an American whistleblower who leaked highly classified information from the National Security Agency (NSA) and the CIA back in 2013, released a book called ‘Permanent Record’ on Sept 17th. The new book of the controversial American now living in exile in Russia got hit with a lawsuit only a few hours after it was published. Accord
Publish At:2019-09-19 17:05 | Read:734 | Comments:0 | Tags:Mobile News News privacy cybersecurity Edward Snowden law su

New Snowden Docs reveal the NSA spy hub Pine Gap in Australia

A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and supporting drone missions A news batch of documents leaked by former NSA contractor Edward Snowden has revealed a United States facility located in Australia’s Northern Territory for covertly monitoring wireless communication
Publish At:2017-08-21 16:10 | Read:4332 | Comments:0 | Tags:Breaking News Intelligence Drone Edward Snowden Hacking Join

WikiLeaks Dumps Docs on CIA’s Hacking Tools

WikiLeaks on Tuesday dropped one of its most explosive word bombs ever: A secret trove of documents apparently stolen from the U.S. Central Intelligence Agency (CIA) detailing methods of hacking everything from smart phones and TVs to compromising Internet routers and computers. KrebsOnSecurity is still digesting much of this fascinating data cache, but here
Publish At:2017-03-09 08:50 | Read:4498 | Comments:0 | Tags:Other Bloomberg Bugcrowd Casey Ellis Center for Cyber Intell

Lavabit, the Snowden recommended encrypted email service, is back

Lavabit, the Snowden recommended encrypted email service, is back. Its CEO Ladar Levison announced new privacy-enhancing features. Do you remember Lavabit? It was the US Encrypted Email Service used by the popular whistleblower Edward Snowden. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the
Publish At:2017-01-21 15:15 | Read:6210 | Comments:0 | Tags:Breaking News Digital ID Hacking anonymity Dark Internet Mai

Trust: The Social Basis of the Internet Ecosystem

Societies function on the basis of trust, and Internet users are no different. Users need to trust the Internet. They need to trust it to keep their data secure, protected and private, and they need to trust it to reliably give them the content they want to view and share. If governed in an inclusive way, users will continue to place their trust in the inter
Publish At:2016-12-06 01:05 | Read:5872 | Comments:0 | Tags:Featured Articles Security Awareness Edward Snowden Privacy

DDoS Mitigation Firm Has History of Hijacks

Last week, KrebsOnSecurity detailed how BackConnect Inc. — a company that defends victims against large-scale distributed denial-of-service (DDoS) attacks — admitted to hijacking hundreds of Internet addresses from a European Internet service provider in order to glean information about attackers who were targeting BackConnect. According to an ex
Publish At:2016-09-20 22:45 | Read:5062 | Comments:0 | Tags:Other Akamai BackConnect Inc. BackConnect LLC Beckman Softwa

British MPs emails are routinely accessed by GCHQ

New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails and peers. The revelations have been made public throug
Publish At:2016-06-03 16:05 | Read:4366 | Comments:0 | Tags:Breaking News Intelligence Laws and regulations Edward Snowd

Sorry Mr. Snowden — encryption isn’t the only path to security

Last week, Google showed off a new messaging app called Allo. The reaction to that announcement was either extremely positive or negative, depending on who was speaking. General consumers liked the product because it built Google smarts into a messaging app, while privacy proponents decried the fact that end-to-end encryption was not a default feature of the
Publish At:2016-05-25 05:10 | Read:3940 | Comments:0 | Tags:Edward Snowden Encryption Google Messaging

2015 intelligence transparency report, the surveillance is still nosey

According to 2015 intelligence transparency report, the searches of US citizens made by the NSA and CIA intelligence agencies have almost doubled since 2013 If you believe that the Snowden‘s revelations have stopped or limited the surveillance activities you are obviously wrong. The diffusion of the technology and the increasing threats of espionage an
Publish At:2016-05-09 13:50 | Read:3385 | Comments:0 | Tags:Breaking News Digital ID Intelligence 2015 transparency repo

How terrorists abuse online services for propaganda?

Researchers at TrendMicro have analyzed online activities of terrorists identifying the techniques and tools used for their propaganda. Using vulnerabilities in software, websites, and web applications as attack vectors, hosting malicious components in cloud services. Other than this if there’s any service getting launched in the future, there will be
Publish At:2016-05-08 19:35 | Read:4244 | Comments:0 | Tags:Breaking News Terrorism Cybercrime Edward Snowden encryption

Redaction error reveals Feds ordered Lavabit to spy on Snowden

A redaction error in court-ordered release of the Lavabit case files confirmed that Edward Snowden was the target of the FBI. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the US authorities ordered it to turn over its Secure Sockets Layer (SSL) private keys to order government surveillance activ
Publish At:2016-03-20 19:05 | Read:4728 | Comments:0 | Tags:Breaking News Laws and regulations Edward Snowden FBI Ladar

Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center

The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due to the presence of the NSA Data Center. The Utah state computer systems experience 300 million hacking attacks a day due to the presence of the NSA data center in the state. The Utah Data Center, also known as the Intelligence Community Comprehens
Publish At:2016-02-21 21:15 | Read:4233 | Comments:0 | Tags:Breaking News Hacking Intelligence Security Edward Snowden N

Anarchist operation, US and UK spied on Israeli UAVs and fighter jets

Anarchist operation – US and UK intelligence secretly tapped into live video feeds from Israeli UAVs and fighter jets, monitoring military operations. According to a new lot of documents leaked by the popular whistleblower Edward Snowden, the US and British intelligence agencies have hacked for years into Israeli Air Sur
Publish At:2016-01-29 12:35 | Read:7070 | Comments:0 | Tags:Breaking News Cyber warfare Intelligence Anarchist operation


Share high-quality web security related articles with you:)


Tag Cloud