HackDig : Dig high-quality web security articles for hacker

Vulnerability Metrics: The Final Frontier

In Part 1 of this series, we looked at some of the metrics that an executive team would want to see to identify how the business risk is trending. It is very important to keep in mind that if the business does not see the information security program as effective and efficient, they will not continue to invest in information security projects.In this part, w
Publish At:2017-04-04 04:40 | Read:678 | Comments:0 | Tags:Featured Articles Vulnerability Management remediation secur

Moving Beyond Network Security to a Data-Centric Approach

In my last post, I briefly summarized the evolution of network security. I will now discuss how network security strategies are no longer meeting the needs of organizations’ increasingly complex IT environments.A Different StrategyTechnological innovation has changed the nature of the network itself. No longer are employees limited to their workstation
Publish At:2017-04-04 04:40 | Read:610 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Network Se

iCloud Hacking: The Cybersecurity Gift that Keeps on Giving

You probably remember the massive iCloud breach in 2014 that resulted in compromised celebrity photos spreading through the internet like wildfire. That egregious invasion of privacy caused great embarrassment and damage to the reputations of nearly 100 A-list stars.Fortunately, these bad deeds did not go unpunished. In 2016, two men were brought to justice
Publish At:2017-04-03 10:15 | Read:575 | Comments:0 | Tags:Featured Articles IT Security and Data Protection hack iClou

U.S. Senate Votes Could Put Your Data Privacy at Risk

Data privacy is a concern for many Americans, but the U.S. Senate is on its way to putting your data at even higher risk of privacy issues. Current laws have broadband privacy rules in place that require Internet Service Providers to receive explicit consent from consumers before they can share or sell private information, such as web browsing data, to adver
Publish At:2017-04-01 21:25 | Read:541 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data Priva

Disttrack Malware Distribution Suggests Link between Shamoon 2 and Magic Hound

In November 2016, the security community first learned of a series of attacks known as “Shamoon 2.” The campaign has launched three waves as of this writing. In the first wave, bad actors infected an organization in Saudi Arabia with Disttrack. This trojan used a wiper component to overwrite protected parts of a system, including the Master Boot
Publish At:2017-03-31 08:35 | Read:695 | Comments:0 | Tags:Cyber Security Featured Articles Magic Hound malware Shamoon

The Six Commandments of the GDPR

Otherwise known as the measuring stick by which your GDPR compliance will be assessed, the six core principles of the GDPR are the basic foundations upon which the regulation was constructed.Unquestionable and pure in nature, they are rarely acknowledged for one simple reason: five of the six have no real application in helping you in peddling products and s
Publish At:2017-03-30 14:10 | Read:591 | Comments:0 | Tags:Featured Articles IT Security and Data Protection GDPR infor

Understanding the Evolution of Network Security

Network security has been around almost as long as we’ve had networks, and it is easy to trace the various elements of network security to the components of networking that they try to mitigate. Over the past 30-35 years or so, the expansion of networking, especially the increased reliance on the Internet both as an avenue for commerce and as the corporate b
Publish At:2017-03-30 14:10 | Read:492 | Comments:0 | Tags:Featured Articles IT Security and Data Protection DMZ networ

Five Scams That Won’t Make You Laugh on April Fool’s Day

If there’s one day of the year when everyone has their guard up, it’s April Fool’s Day.After all, who can put their hand up and say that they have never been duped by an April Fool’s trick?Some of the classic April Fool’s stunts have gone down in history, such as the BBC’s news report from 1957 showing the annual spaghetti
Publish At:2017-03-30 14:10 | Read:564 | Comments:0 | Tags:Featured Articles IT Security and Data Protection April Fool

Scan the Entire RFC 1918 Private IP Space? Are You Crazy? Maybe Not . . .

The private IP space defined by RFC 1918 contains almost 18 million IP addresses. A customer was interested in having me do host discovery on this entire space for their private IP space. This is interesting data for network owners because it:Increases awareness to the size of the network attack surface, such as the number of accessible hosts and servicesCan
Publish At:2017-03-29 01:05 | Read:545 | Comments:0 | Tags:Featured Articles IT Security and Data Protection penetratio

5 Signs Your Cybersecurity Awareness Program Is Paying Off

Not too long ago, a client of ours who had just released a dynamic new cybersecurity awareness course told me how blown away he was with the response they were getting.His inbox was full of compliments, and his colleagues wanted to duplicate his training success in their own departments. He recounted how employees stopped him in the hallway to thank him for
Publish At:2017-03-29 01:05 | Read:541 | Comments:0 | Tags:Featured Articles Security Awareness awareness cybersecurity

Celebrating the Pig: How to Engineer a Durable Security Culture

Dashlane asked this question to over 2,000 people:“Would you give up sex for a year if it meant that you would not have to worry about ever getting hacked or getting your identity stolen?”Over 39 percent of respondents said “yes.”This has got to be a very frustrating response to more security experts than just myself. We experts dedic
Publish At:2017-03-29 01:05 | Read:557 | Comments:0 | Tags:Featured Articles Security Awareness behavior Culture securi

Turning Data into Metrics – A Vulnerability Story

One of the main issues I find across the information security industry is that we constantly need to justify our existence. IT has been the traditional cost centre, but businesses have slowly realized they need to spend on IT to enable their businesses. Information security, on the other hand, is the team that is constantly preventing the business from freel
Publish At:2017-03-28 06:40 | Read:557 | Comments:0 | Tags:Featured Articles Vulnerability Management remediation secur

The Sackcloth & Ashes of WordPress Security

This is my first blog in an ongoing “It’s Not Rocket Science” series featuring articles on Information security.“Security is not an absolute, it’s a continuous process and should be managed as such. Security is about risk reduction, not risk elimination, and risk will never be zero. It’s about employing the appropriate security controls tha
Publish At:2017-03-28 06:40 | Read:546 | Comments:0 | Tags:Featured Articles IT Security and Data Protection CMS securi

3 Trends in Support of a More Nuanced Approach to ICS Security

The security community has seen multiple high-profile incidents targeting industrial control systems (ICS) over the past few years. No one can forget Christmas 2015, when a threat actor linked to the Russian government sent spear-phishing emails to the Western Ukrainian power company Prykarpattyaoblenergo.Those messages were laced with BlackEnergy, a form of
Publish At:2017-03-27 12:15 | Read:553 | Comments:0 | Tags:Featured Articles ICS Security ics malware security

5 Lessons Lock Picking Can Teach You About Cyber Security

Security is a complex and connected web. Though there are many different categories within the all-encompassing field of security, there are still certain lessons that translate across the disciplines. Physical security can largely be seen as a manifestation of the ethereal elements of cyber security. Both the digital and the physical worlds of security rely
Publish At:2017-03-27 12:15 | Read:468 | Comments:0 | Tags:Cyber Security Featured Articles Exploit lock picking

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud