HackDig : Dig high-quality web security articles for hackers

The OpenSSL Project addressed three vulnerabilities

The OpenSSL Project addressed three vulnerabilities, including two denial-of-service (DoS) issues and a bug in the SSLv2 rollback protection. The OpenSSL Project released security patches to address three vulnerabilities, two denial-of-service (DoS) flaws, and an incorrect SSLv2 rollback protection issue. The fist vulnerability, tracked as CVE-2021
Publish At:2021-02-18 03:08 | Read:242 | Comments:0 | Tags:Breaking News Security encryption Hacking hacking news infor

Court documents show FBI could use a tool to access private Signal messages on iPhones

Court documents obtained by Forbes revealed that the FBI may have a tool that allows accessing private Signal messages on iPhones. Court documents related to a recent gun-trafficking case in New York and obtained by Forbes revealed that the FBI may have a tool to access private Signal messages. The documents revealed that encrypted messages can be inte
Publish At:2021-02-13 14:25 | Read:219 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Mobile encryption FBI hack

Google discloses a severe flaw in widely used Libgcrypt encryption library

Google discovered a flaw in GNU Privacy Guard (GnuPG)’s Libgcrypt encryption library that could be exploited to get remote code execution. The popular white hat hacker Tavis Ormandy of Google Project Zero discovered a severe heap buffer overflow flaw in GNU Privacy Guard (GnuPG)’s Libgcrypt encryption software could have allowed a remote attac
Publish At:2021-02-01 09:24 | Read:170 | Comments:0 | Tags:Breaking News Hacking Security encryption hacking news infor

What’s up with WhatsApp’s privacy policy?

WhatsApp has been in the news recently after changes to its privacy policy caused a surge of interest in rival messaging app Signal. Initial reports may have worried a lot of folks, leading to inevitable clarifications and corrections. But what, you may ask, actually happened? Is there a problem? Are you at risk? Or should you keep using your apps as you wer
Publish At:2021-01-18 12:24 | Read:239 | Comments:0 | Tags:Privacy data data collection encryption facebook messaging p

Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy

They come in the mail — ominous-looking envelopes that are devoid of branding and obvious marketing embellishments. Plain white, marked with often-unrecognizable return addresses, and relatively thin — the contents of which will spoil your day and cause you to lose yet a bit more faith in humanity. No, it’s not a tax bill; rather, it&rsquo
Publish At:2020-12-17 09:29 | Read:313 | Comments:0 | Tags:Data Protection Security Services data encryption Data Priva

Why is encryption essential for modern day communications?

As we all are patiently waiting for 2020 to be over, it is easy to say that humanity has become significantly more dependent on technology, especially online communications. Nowadays, most of the communications that we do on personal and business levels are conducted online using smartphones, tablets, and computers. Many messages and video conferencing provi
Publish At:2020-12-14 13:40 | Read:292 | Comments:0 | Tags:Mobile News Security advanced cybersecurity corporate encryp

How to Use Apple’s Built-in Features to Encrypt Files and Folders

The best way to protect your data is to encrypt your files, ensuring that, even if they get into the hands of hackers or cybercriminals, no one can access your personal data. macOS provides a suite of tools to protect you, and, in this article, I’ll discuss the many ways you can use built-in macOS features to provide unbreakable encryption. (Unbreakabl
Publish At:2020-11-24 02:08 | Read:362 | Comments:0 | Tags:Software & Apps Apple encryption FileVault OS X Print to PDF

RansomEXX Trojan attacks Linux systems

We recently discovered a new file-encrypting Trojan built as an ELF executable and intended to encrypt data on machines controlled by Linux-based operating systems. After the initial analysis we noticed similarities in the code of the Trojan, the text of the ransom notes and the general approach to extortion, which suggested that we had in fact encountered a
Publish At:2020-11-06 11:47 | Read:497 | Comments:0 | Tags:Featured Malware descriptions Encryption Linux Malware Descr

Will Quantum Computing Change Computer Security? – Intego Mac Podcast Episode 159

Quantum computing is just around the corner, and it will affect the way computer security works. Strong passwords and encryption will be cracked, and we’ll need new ways to secure our data and identity. We also discuss complaints against Apple’s coming anti-tracking protection in iOS, and we revisit the suggestions that Apple may build its own se
Publish At:2020-10-29 13:49 | Read:532 | Comments:0 | Tags:Intego Mac Security Podcast encryption quantum computing sec

How Quantum Computing Will Affect Computer Security and Passwords

One of the key elements in securing or data and our identities is the use of strong passwords. Using passwords that can’t be guessed—unlike the perennial favorites 123456 or password—helps ensure that hackers and cybercriminals can’t access your computer, mobile device, or websites where you’ve created accounts, and can’t steal your i
Publish At:2020-10-29 09:00 | Read:325 | Comments:0 | Tags:Security & Privacy encryption passwords security

Five Eyes nations plus India and Japan call for encryption backdoor once again

Members of the Five Eyes intelligence alliance once again call for tech firms to engineer backdoors into end-to-end and device encryption. States of the Five Eyes intelligence alliance (US, UK, Canada, Australia, and New Zealand), plus Japan and India, once again call for tech firms to implement backdoors into end-to-end and device encryption. “We, the
Publish At:2020-10-13 03:25 | Read:824 | Comments:0 | Tags:Breaking News Laws and regulations backdoor encryption Five

Ransomware Attacks: How to Protect your Data With Encryption

Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. Recently, the University of California San Francisco fell victim to a ransomware attack on key academic and research data (the institution is known to be working on a cure for COVID-19) and ended up paying over $1.14
Publish At:2020-09-04 12:08 | Read:670 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Malware Mob

Learn How to Secure Personally Identifiable Information, Now

As more work shifts to remote, organizations continue dealing with security challenges. Employees are now connecting to internal network resources from varied devices, and many may be connecting with personal devices. Working from off-site locations presents more chances for accidental and malicious data disclosure alike. Protecting personally identifiable
Publish At:2020-08-31 14:24 | Read:753 | Comments:0 | Tags:Data Protection Data Loss Prevention (DLP) Encryption Person

How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That data could involve military campaigns, plots to overthrow political leaders or political dealings. In some cases, the use of en
Publish At:2020-08-03 12:25 | Read:652 | Comments:0 | Tags:Data Protection Cybersecurity data encryption Data Security

EncroChat system eavesdropped on by law enforcement

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security of your device. This text caused a lot of aggravation, worries, and sleepless nights. No one wants to hear the security of their device has been compromised by a malware attack. The good news is that the actual victims of this malware attack wer
Publish At:2020-07-22 16:05 | Read:877 | Comments:0 | Tags:Hacking cryptophone encrochat encryption end-to-end encrypti

Tools

Tag Cloud