HackDig : Dig high-quality web security articles for hacker

IDF soldiers tricked into installing malicious apps by Hamas operatives posing as attractive women

Israeli Force (IDF) announced it has thwarted an attempt by the Hamas militant group to hack soldiers’ phones by posing as attractive women on social media. Israeli Defence Force (IDF) announced it has thwarted an attempt by the Hamas militant group to hack soldiers’ mobile devices by posing as attractive women on social media and instant messaging apps
Publish At:2020-02-17 07:37 | Read:366 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Malware Mobile Espionage

Crypto AG was spied for US, German intelligence agencies for decades

Swiss authorities are investigating into allegations the company Crypto AG, a Switzerland-based maker of encryption devices, was a front company for the CIA and German intelligence. According to a joint report published by Germany’s ZDF public broadcaster and The Washington Post the Swiss-based firm Crypto AG was operating for CIA and the German Intellige
Publish At:2020-02-12 10:53 | Read:389 | Comments:0 | Tags:Breaking News Cyber warfare Digital ID Intelligence Crypto A

Malaysia’s MyCERT warns cyber espionage campaign carried out by APT40

Malaysia’s MyCERT issued a security alert to warn of a hacking campaign targeting government officials that was carried out by the China-linked APT40 group. Malaysia’s Computer Emergency Response Team (MyCERT) warns of a cyber espionage campaign carried out by the China-linked APT40 group aimed at Malaysian government officials. The attacke
Publish At:2020-02-10 07:12 | Read:331 | Comments:0 | Tags:APT Cyber warfare Malware China Espionage Hacking hacking ne

Report: Organizations remain vulnerable to increasing insider threats

The latest data breach at Capital One is a noteworthy incident not because it affected over 100 million customer records, 140,000 Social Security numbers (SSNs), and 80,000 linked bank accounts. Nor was it special because the hack was the result of a vulnerable firewall misconfiguration. Many still talk about this breach because a leak of this magnitude,
Publish At:2019-12-05 16:50 | Read:598 | Comments:0 | Tags:Awareness Carnegie Mellon University cert insider threat cen

Wikileaks: CIA HighRise Android malware used to intercept and redirect SMSs

Wikileaks released the documentation for HighRise, an Android app used by the CIA to intercept and redirecting SMS messages to a CIA-controlled server. WikiLeaks just published a new batch of documents related to another CIA hacking tool dubbed HighRise included in the Vault 7 released in partnership with media partners. The tool is an Android application us
Publish At:2017-07-14 00:15 | Read:2923 | Comments:0 | Tags:Breaking News Hacking Intelligence Malware Android malware C

While Trump confirms information sharing with Russians, CIA and NSA leaks threaten Global Security

Opponents of U.S. President Trump are currently locked into scoring political points over alleged leaks from the White House during a meeting with top Russian envoys. Yet, classified details of the meeting leaked to press outlets by either the CIA or NSA shows massive breaches of valuable sources and details from inside U.S. intelligence agencies are now dam
Publish At:2017-05-18 16:45 | Read:3803 | Comments:0 | Tags:Breaking News Intelligence data leak Espionage President Tru

Android Chrysaor spyware went undetected for years

Chrysaor spyware is an Android surveillance malware that remained undetected for at least three years, NSO Group Technology is suspected to be the author. Security experts at Google and Lookout spotted an Android version of one of the most sophisticated mobile spyware known as Chrysaor that remained undetected for at least three years. due to its smart self-
Publish At:2017-04-05 19:25 | Read:3267 | Comments:0 | Tags:Breaking News Malware Mobile Android Chrysaor spyware Espion

Privacy Guard – Let’s evaluate privacy risks caused by the apps installed on our device

Privacy Guard is an Android app that evaluates the risks of data privacy relying on the permissions requested by the apps installed on a device. Mobile devices collect a large volume of personal information that could be used for malicious purposes by adversaries. In order to increase the awareness of user towards the possibility of data leakage and the impo
Publish At:2017-03-16 19:55 | Read:3745 | Comments:0 | Tags:Breaking News Digital ID Mobile Espionage mobile privacy Pri

Russian cyber experts were charged with treason due to the allegations made seven years ago

In December 2016 two Russian state security officers and a cyber security expert in Moscow were charged with treason due allegations made 7 years ago. In December 2016 two Russian state security officers and a cyber-security expert in Moscow were charged with treason due to the allegations made by a Russian businessman seven years ago. One of them is the hea
Publish At:2017-02-27 12:20 | Read:3402 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Intelligence Espionage FSB

Operation Kingphish: Cyber Attacks against human rights activists in Qatar and Nepal

Amnesty International has recently uncovered a spear phishing campaign dubbed Operation Kingphish that targeted groups in Qatar and Nepal. Human rights organizations and journalists continue to be a privileged target of phishing campaigns that attempt to steal the Google credentials of the victims. The malicious messages try to lure victims into viewing docu
Publish At:2017-02-15 23:40 | Read:4568 | Comments:0 | Tags:Breaking News Hacking Hacktivism Intelligence Social Network

ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security The European Union Agency for Network and Information Security (ENISA) is an EU Agency composed of security experts that work with these states, public organizations and private groups to develop advice and recommendations on go
Publish At:2017-02-09 19:50 | Read:4681 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Data Breach Deep Web

Weaponizing of the insider in the Dark Web, a dangerous phenomenon

A study revealed how hackers in the dark web are arming insiders with the tools and knowledge necessary to help steal corporate secrets. The dark web is the right place where to buy and sell corporate secrets, experts at the risk management firm RedOwl and Israeli threat intelligence firm IntSights made an interesting research titled “Monetizing the In
Publish At:2017-02-01 09:10 | Read:9370 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Cybercrime Dark Web Data

President Obama commutes Chelsea Manning sentence

President Barack Obama has commuted Chelsea Manning’s sentence for leaking confidential documents to Wikileaks in 2010. He will be released on May 17th. President Barack Obama took a historic decision, he has commuted Chelsea Manning’s sentence for leaking classified documents to Wikileaks in 2010. The news was reported by The New York Times, Man
Publish At:2017-01-18 13:35 | Read:2537 | Comments:0 | Tags:Breaking News Intelligence Chelsea Manning Espionage militar

Infected firmware spotted in well-known low-cost Android devices

Experts from Doctor Web spotted new Trojans into the firmware of several dozens of low-cost Android smartphones and tablets. Again problems with low-cost Android smartphones and tablets, once again experts discovered certain mobile devices shipped with malicious firmware. According to malware researchers from antivirus firm Dr.Web, the firmware of a large nu
Publish At:2016-12-14 14:15 | Read:4443 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Mobile advertising

A second backdoor in a week discovered in firmware of Chinese low-cost Android devices

For the second time in a few days, security experts spotted a backdoor in the firmware of low-cost Android devices. Last week, security experts from Kryptowire firm have discovered a backdoor in the firmware installed on low-cost Android phones. The backdoor affects mobile phones from BLU Products that are available for sale on both Amazon and Best Buy. The
Publish At:2016-11-20 18:30 | Read:4050 | Comments:0 | Tags:Breaking News Hacking Mobile advertising backdoor China Espi


Share high-quality web security related articles with you:)


Tag Cloud