HackDig : Dig high-quality web security articles for hackers

More Effective Security Awareness: 3 Tips for NCSAM

It’s often said that humans are the weakest link in cybersecurity. Indeed, I’d have a hard time arguing that a computer that was sealed in a box, untouched by human hand, poses much of a security risk. But a computer that is unused has no purpose. It behooves security practitioners to get smarter about how we teach people to use those machines so that both h
Publish At:2020-10-21 04:31 | Read:145 | Comments:0 | Tags:Featured Articles Security Awareness cyber security culture

A Closer Look at the Attempted Ransomware Attack on Tesla

Cybersecurity is in the news again with the disclosure that Tesla, working in conjunction with the FBI, prevented a ransomware attack from being launched at its Gigafactory in Nevada. The cybercriminals targeted Tesla through one of its employees, whom they allegedly promised to pay $1 million in order to help them infect the company’s system with malware.Wh
Publish At:2020-10-20 01:13 | Read:102 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Cyberattac

Barnes & Noble warns customers it has been hacked, customer data may have been accessed

American bookselling giant Barnes & Noble is contacting customers via email, warning them that its network was breached by hackers, and that sensitive information about shoppers may have been accessed.In the email to customers, Barnes & Noble says that it became aware that it had fallen victim to a cybersecurity attack on Saturday October 10th.Part o
Publish At:2020-10-15 08:07 | Read:136 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Barnes & N

Lessons From Teaching Cybersecurity: Week 3

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python aim
Publish At:2020-10-14 00:55 | Read:115 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Career Sof

Podcast Episode 10 – Face off: Debating Facial Recognition with Thom Langford & Paul Edon

Recovering CISO and Director of (TL)2 Security Thom Langford joins the show to debate Tripwire’s Paul Edon on facial recognition vs. security.Spotify: https://open.spotify.com/episode/5wXKv9DiQjfsZNf6heXg67Stitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist
Publish At:2020-10-13 01:55 | Read:167 | Comments:0 | Tags:Featured Articles Podcast facial recognition facial recognit

Shared Responsibility and Configuration Management in the Cloud: SecTor 2020

A number of high-profile data breaches have resulted directly from misconfigured permissions or unpatched vulnerabilities. For instance, the 2017 Equifax breach was the result of exploiting an unpatched flaw in Apache Struts allowing remote code execution. More recently, the Capital One breach last year stemmed from a misconfigured web application firewall.
Publish At:2020-10-13 01:55 | Read:130 | Comments:0 | Tags:Cloud Featured Articles AWS configuration Google Cloud hybri

Deepfake Voice Technology Iterates on Old Phishing Strategies

As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals grows increasingly potent. This growing sophistication of the latest software and algorithms has allowed malicious hackers, scammers and cyber criminals who work tirelessly behind the scenes to stay one step ahead of the authorities, making th
Publish At:2020-10-12 02:31 | Read:135 | Comments:0 | Tags:Featured Articles IT Security and Data Protection AI cybercr

How Cybersecurity Leaders Can Understand the Value of Their Organization’s Security Solutions

“Gartner projections show the growth in cybersecurity spending is slowing. Cybersecurity grew at 12% (CAGR) in 2018, and it is projected to decline to only 7% (CAGR) by 2023. Gartner clients are also reporting that after years of quarterly reporting on cybersecurity to their boards, that boards are now pushing back and asking for improved data and understand
Publish At:2020-10-12 02:31 | Read:117 | Comments:0 | Tags:Featured Articles IT Security and Data Protection business v

Hackers disguise malware attack as new details on Donald Trump’s COVID-19 illness

The confirmation that US President Donald Trump has been infected by the Coronavirus, and had to spend time this weekend in hospital, has – understandably – made headlines around the world.And there are plenty of people, on both sides of the political divide, who are interested in learning more about his health status.It’s no surprise, ther
Publish At:2020-10-08 08:49 | Read:164 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Coronaviru

How Tripwire Custom Workflow Automation Can Enhance Your Network Visibility

Tripwire Enterprise is a powerful tool. It provides customers insight into nearly every aspect of their systems and devices. From change management to configuration and compliance, Tripwire can provide “eyes on” across the network.Gathering that vast amount of data for analysis does not come without challenges. Customers have asked for better integration wit
Publish At:2020-10-08 01:01 | Read:125 | Comments:0 | Tags:Featured Articles Automation TCWA Tripwire Custom Workflow A

Achieving Compliance with Qatar’s National Information Assurance Policy

Qatar is one of the wealthiest countries in the world. Finances Online, Global Finance Magazine and others consider it to be the wealthiest nation. This is because the country has a small population of under 3 million but relies on oil for the majority of its exports and Gross Domestic Product (GDP). These two factors helped to push the country’s GDP measure
Publish At:2020-10-08 01:01 | Read:158 | Comments:0 | Tags:Featured Articles Regulatory Compliance Complaince data Info

Lessons From Teaching Cybersecurity: Week 2

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python cla
Publish At:2020-10-07 01:37 | Read:194 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Intern Men

30 Ransomware Prevention Tips

Dealing with the aftermath of ransomware attacks is like Russian roulette. Submitting the ransom might seem like it’s the sole option for recovering locked data. But paying the ransom doesn’t mean that your organization will get its affected data back.Let’s not forget that ransomware also continues to evolve as a threat category. Beginning in late November 2
Publish At:2020-10-05 06:43 | Read:167 | Comments:0 | Tags:Cyber Security Featured Articles Backup firewall password Ph

Tripwire Patch Priority Index for September 2020

Tripwire‘s September 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Apple, and various Linux distributions.Up first on the patch priority list this month is a very high priority vulnerability, which is called “Zerologon” and identified by CVE-2020-1472. It is an elevation of privilege vulnerability
Publish At:2020-10-05 02:49 | Read:173 | Comments:0 | Tags:Featured Articles VERT Apple Linux microsoft patch priority

What to do first when your company suffers a ransomware attack

For many companies it would be a nightmare to discover that they are the latest unwitting victim of a ransomware attack, capable of crippling computer systems and locking up data if a payment isn’t made to cybercriminals.There’s no magic wand that can make a ransomware attack simply disappear with no impact at all on an organisation, but you can
Publish At:2020-10-01 09:07 | Read:73 | Comments:0 | Tags:Featured Articles IT Security and Data Protection ransomware

Tools

Tag Cloud