HackDig : Dig high-quality web security articles for hackers

European police infiltrate and dismantled EncroChat chat network

A joint operation conducted by European police arrested hundreds of criminals after that agents infiltrated into EncroChat encrypted chat network. In a joint operation conducted by European and British law enforcement agencies resulted in the arrest of hundreds of alleged drug dealers and other crooks. The police infiltrated into a global network of an en
Publish At:2020-07-04 14:32 | Read:164 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime EncroChat encry

United States wants HTTPS for all government sites, all the time

byPaul DucklinThe US government just announced its plans for HTTPS on all dot-gov sites.HTTPS, of course, is short for for “secure HTTP”, and it’s the system that puts the padlock in your browser’s address bar.Actually, the government is going one step further than that.As well as saying all dot-gov sites should be available over HTTP
Publish At:2020-06-23 12:49 | Read:140 | Comments:0 | Tags:Uncategorized Encryption https TLS US government web securit

IBM releases open-source toolkits implementing FHE to process data while encrypted

IBM has released open-source toolkits implementing fully homomorphic encryption (FHE) that allow researchers to process data while it’s still encrypted. IBM has released open-source toolkits implementing fully homomorphic encryption (FHE), which allows researchers to process encrypted data without having access to the actual data. The toolkits release
Publish At:2020-06-08 05:23 | Read:241 | Comments:0 | Tags:Breaking News Security encryption FHE information security n

Contact Tracing: De-mystifying How an App Designed to Track People Can Ensure User Privacy and Security

Many governments in many countries around the world recognise that contact tracing plays a very important part to reduce the spread of the deadly disease, COVID-19. In this article, we take a look at the conventional method of contact tracking and comparing it against how technology helps contact tracing and its pro’s and con’s.Traditional contact tracing is
Publish At:2020-06-02 06:01 | Read:191 | Comments:0 | Tags:Healthcare Contact Tracing COVID-19 data privacy encryption

Going dark: encryption and law enforcement

UPDATE, 05/22/2020: In the advent of the EARN IT Act, the debate on government subversion of encryption has reignited.  Given that the material conditions of the technology have not changed, and the arguments given in favor of the bill are not novel, we’ve decided to republish the following blog outlining our stance on the subject. Originally published
Publish At:2020-05-24 07:20 | Read:249 | Comments:0 | Tags:Government Privacy Security world backdoor Department of Jus

How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address many work-from-home cybersecurity challenges — such as secure end-to-end encryption a
Publish At:2020-05-24 06:18 | Read:178 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ac

Introducing Malwarebytes Privacy

Here at Malwarebytes, we’re no strangers to using virtual private networks (VPNs) to protect our privacy while browsing online. Regular readers of our blog will remember that we’ve advised on VPN usage on many occasions, whether for mobile device users looking for anonymity or business owners wanting additional authentication protocols. We believe VPNs are a
Publish At:2020-05-03 14:39 | Read:369 | Comments:0 | Tags:Malwarebytes news Data privacy encryption IP address Malware

L4NC34 Ransomware’s Encryption Routine Reversed by Researchers

Security researchers reversed the encryption routine employed by L4NC34 ransomware by decrypting a file without paying the ransom.Sucuri Security first encountered L4NC34 ransomware when it began investigating an attack in which a malicious actor encrypted all website files and appended “.crypt” to their file names.The security firm dug a bit dee
Publish At:2020-04-07 08:18 | Read:558 | Comments:0 | Tags:IT Security and Data Protection Latest Security News encrypt

WildPressure targets industrial-related entities in the Middle East

In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum. All the victims we registered were organizations from the Middle East. At least some of them are related to industrial sector. Our Kaspersky Threat Attribution Engine (KTAE) doesn’t show any code similarities with known campaigns. Nor h
Publish At:2020-03-24 06:44 | Read:604 | Comments:0 | Tags:APT reports Featured Encryption Industrial threats Malware D

Crypto-Risk: Your Data Security Blind Spot

For many years — almost since the beginning of secure internet communications — data security professionals have had to face the challenge of using certificates, the mechanism that forms the basis of Transport Layer Security (TLS) communications. Certificates facilitate secure connections to websites (represented by the “s” in “https”
Publish At:2020-03-23 10:45 | Read:524 | Comments:0 | Tags:Data Protection Risk Management Apple Business Continuity Ce

Report calls for web pre-screening to end UK’s child abuse ‘explosion’

byLisa VaasA UK inquiry into child sexual abuse facilitated by the internet has recommended that the government require apps to pre-screen images before publishing them, in order to tackle “an explosion” in images of child sex abuse.The No. 1 recommendation from the independent inquiry into child sexual abuse (IICSA) report, which was published o
Publish At:2020-03-16 08:53 | Read:621 | Comments:0 | Tags:Cryptography Facebook Instagram Law & order Privacy Snapchat

PXJ Ransomware Campaign Identified by X-Force IRIS

Ransomware has become one of the most profitable types of malware in the hands of cybercriminals, with reported cybercrime losses tripling in the last five years, according to the FBI. A constant flow of new and reused code in this realm continues to flood both consumers and organizations who fight to prevent infections, respond to attacks and often resort t
Publish At:2020-03-12 09:13 | Read:621 | Comments:0 | Tags:Malware Threat Intelligence Cryptography Cybercrime Encrypti

Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse

The financial malware arena became a mainstream issue a little over a decade ago with the rise of malware like the Zeus Trojan, which at the time was the first commercial banking Trojan available to the cybercrime world. We have come a long way since, and the past decade saw banking Trojans become increasingly sophisticated, specialized and exclusive, operat
Publish At:2020-02-18 09:32 | Read:539 | Comments:0 | Tags:Malware Threat Intelligence Banking Trojan Botnets Cybercrim

Russian govn blocked Tutanova service in Russia to stop encrypted communication

Tutanota, the popular free and open-source end-to-end encrypted email software, has been blocked by Russian authorities. The popular free and open-source end-to-end encrypted email service Tutanota has been blocked in Russia on Friday evening. Since early February, the Russian government has blocked other encrypted email and VPN services in Russia, includ
Publish At:2020-02-17 11:24 | Read:625 | Comments:0 | Tags:Breaking News Hacking Laws and regulations Censorship encryp

Suspect who refused to decrypt hard drives released after four years

byJohn E DunnThe contentious case of a man held in custody since 2015 for refusing to decrypt two hard drives appears to have reached a resolution of sorts after the US Court of Appeals ordered his release.Former Philadelphia police sergeant Francis Rawls was arrested in September 2015, during which the external hard drives were seized along with other compu
Publish At:2020-02-15 12:43 | Read:581 | Comments:0 | Tags:Apple Law & order Privacy child pornography contempt Encrypt


Share high-quality web security related articles with you:)