HackDig : Dig high-quality web security articles for hacker

6 Common Phishing Attacks and How to Protect Against Them

Phishing attacks don’t show any sign of slowing down. Per its 2019 Phishing Trends and Intelligence Report, PhishLabs found that total phishing volume rose 40.9 percent over the course of 2018. These attacks targeted a range of organizations, especially financial service companies, email and online service providers and cloud/file hosting firms. It’s, theref
Publish At:2019-10-18 10:10 | Read:376 | Comments:0 | Tags:Featured Articles Security Awareness business email compromi

NCSAM: It’s Everyone’s Job to Ensure Online Safety at Work

October is National Cyber Security Awareness Month (NCSAM). NCSAM is a great initiative to help educate and inform our friends and family on the importance of taking your digital security seriously. To help continue to support this initiative, we asked a range of industry experts to share some of their tips to help us stay safe online.Angus Macrae | Head of
Publish At:2019-10-18 10:10 | Read:303 | Comments:0 | Tags:Featured Articles Security Awareness cybersecurity NCSAM Res

Ransomware victim hacks attacker, turning the tables by stealing decryption keys

Normally it works like this.Someone gets infected by ransomware, and then they pay the ransom. The victim then licks their wounds and hopefully learns something from the experience.And that’s what happened to Tobias Frömel, a German developer and web designer who found himself paying a Bitcoin ransom of 670 Euros (US $735) after his QNAP NAS drive was
Publish At:2019-10-18 10:10 | Read:329 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Muhstik ra

Clean IT Up: Cyber Hygiene Controls Tips

October is national cybersecurity awareness month, and with the recent hacks at Door Dash, the discovery of a large-scale iOS hacking campaign, and a database containing 419 million phone numbers associated with Facebook accounts, we’re all likely feeling a little dirty. So, I decided to share my perspectives on cyber hygiene.The dictionary defines hygiene a
Publish At:2019-10-18 10:10 | Read:249 | Comments:0 | Tags:Featured Articles Security Awareness cyber hygiene supply ch

Vulnerability Metrics: The Final Frontier

In Part 1 of this series, we looked at some of the metrics that an executive team would want to see to identify how the business risk is trending. It is very important to keep in mind that if the business does not see the information security program as effective and efficient, they will not continue to invest in information security projects.In this part, w
Publish At:2017-04-04 04:40 | Read:6049 | Comments:0 | Tags:Featured Articles Vulnerability Management remediation secur

Moving Beyond Network Security to a Data-Centric Approach

In my last post, I briefly summarized the evolution of network security. I will now discuss how network security strategies are no longer meeting the needs of organizations’ increasingly complex IT environments.A Different StrategyTechnological innovation has changed the nature of the network itself. No longer are employees limited to their workstation
Publish At:2017-04-04 04:40 | Read:5585 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Network Se

iCloud Hacking: The Cybersecurity Gift that Keeps on Giving

You probably remember the massive iCloud breach in 2014 that resulted in compromised celebrity photos spreading through the internet like wildfire. That egregious invasion of privacy caused great embarrassment and damage to the reputations of nearly 100 A-list stars.Fortunately, these bad deeds did not go unpunished. In 2016, two men were brought to justice
Publish At:2017-04-03 10:15 | Read:4942 | Comments:0 | Tags:Featured Articles IT Security and Data Protection hack iClou

U.S. Senate Votes Could Put Your Data Privacy at Risk

Data privacy is a concern for many Americans, but the U.S. Senate is on its way to putting your data at even higher risk of privacy issues. Current laws have broadband privacy rules in place that require Internet Service Providers to receive explicit consent from consumers before they can share or sell private information, such as web browsing data, to adver
Publish At:2017-04-01 21:25 | Read:9326 | Comments:1 | Tags:Featured Articles IT Security and Data Protection data Priva

Disttrack Malware Distribution Suggests Link between Shamoon 2 and Magic Hound

In November 2016, the security community first learned of a series of attacks known as “Shamoon 2.” The campaign has launched three waves as of this writing. In the first wave, bad actors infected an organization in Saudi Arabia with Disttrack. This trojan used a wiper component to overwrite protected parts of a system, including the Master Boot
Publish At:2017-03-31 08:35 | Read:4710 | Comments:0 | Tags:Cyber Security Featured Articles Magic Hound malware Shamoon

The Six Commandments of the GDPR

Otherwise known as the measuring stick by which your GDPR compliance will be assessed, the six core principles of the GDPR are the basic foundations upon which the regulation was constructed.Unquestionable and pure in nature, they are rarely acknowledged for one simple reason: five of the six have no real application in helping you in peddling products and s
Publish At:2017-03-30 14:10 | Read:5333 | Comments:0 | Tags:Featured Articles IT Security and Data Protection GDPR infor

Understanding the Evolution of Network Security

Network security has been around almost as long as we’ve had networks, and it is easy to trace the various elements of network security to the components of networking that they try to mitigate. Over the past 30-35 years or so, the expansion of networking, especially the increased reliance on the Internet both as an avenue for commerce and as the corporate b
Publish At:2017-03-30 14:10 | Read:5115 | Comments:0 | Tags:Featured Articles IT Security and Data Protection DMZ networ

Five Scams That Won’t Make You Laugh on April Fool’s Day

If there’s one day of the year when everyone has their guard up, it’s April Fool’s Day.After all, who can put their hand up and say that they have never been duped by an April Fool’s trick?Some of the classic April Fool’s stunts have gone down in history, such as the BBC’s news report from 1957 showing the annual spaghetti
Publish At:2017-03-30 14:10 | Read:4355 | Comments:0 | Tags:Featured Articles IT Security and Data Protection April Fool

Scan the Entire RFC 1918 Private IP Space? Are You Crazy? Maybe Not . . .

The private IP space defined by RFC 1918 contains almost 18 million IP addresses. A customer was interested in having me do host discovery on this entire space for their private IP space. This is interesting data for network owners because it:Increases awareness to the size of the network attack surface, such as the number of accessible hosts and servicesCan
Publish At:2017-03-29 01:05 | Read:5360 | Comments:0 | Tags:Featured Articles IT Security and Data Protection penetratio

5 Signs Your Cybersecurity Awareness Program Is Paying Off

Not too long ago, a client of ours who had just released a dynamic new cybersecurity awareness course told me how blown away he was with the response they were getting.His inbox was full of compliments, and his colleagues wanted to duplicate his training success in their own departments. He recounted how employees stopped him in the hallway to thank him for
Publish At:2017-03-29 01:05 | Read:5140 | Comments:0 | Tags:Featured Articles Security Awareness awareness cybersecurity

Celebrating the Pig: How to Engineer a Durable Security Culture

Dashlane asked this question to over 2,000 people:“Would you give up sex for a year if it meant that you would not have to worry about ever getting hacked or getting your identity stolen?”Over 39 percent of respondents said “yes.”This has got to be a very frustrating response to more security experts than just myself. We experts dedic
Publish At:2017-03-29 01:05 | Read:5594 | Comments:0 | Tags:Featured Articles Security Awareness behavior Culture securi

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud