HackDig : Dig high-quality web security articles for hacker

How to Protect Your E-commerce Business from Cyber Attacks

Just as traditional brick-and-mortar businesses are targeted by anarchists during protests or times of unrest, e-commerce businesses are targeted by cyber criminals, except they don’t wait for particular season or reason.Whether small, medium or large, every business is, sadly, at the mercy of hackers who will exploit every opportunity they get to breach sen
Publish At:2017-03-23 16:10 | Read:3599 | Comments:0 | Tags:Cyber Security Featured Articles cyber attack E-commerce SSL

SCM: Reducing Security Risk via Assessment and Continuous Monitoring

As I discussed in a previous blog post, a key security control known as file integrity monitoring (FIM) helps organizations defend against digital threats by monitoring for unauthorized changes to their system state. But that’s only half the battle. A change could be authorized but still create new security risk. Organizations need to watch for these t
Publish At:2017-03-23 16:10 | Read:2860 | Comments:0 | Tags:Featured Articles Security Configuration Management complian

Author of Citadel malware, used to steal $500 million from bank accounts, pleads guilty

The Russian author of the notorious Citadel malware which infected over 11 million PCs and stole an astonishing $500 million from bank accounts has pleaded guilty to his crimes.29-year-old Mark Vartanyan, who went by the online handle of “Kolypto”, was arrested in the Norwegian town of Fredrikstad in 2015 at the request of the FBI. His extraditio
Publish At:2017-03-23 16:10 | Read:2190 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Citadel ma

Stop the Most Advanced Adversaries

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits.However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest versions, the list of new exp
Publish At:2017-03-22 03:20 | Read:4975 | Comments:0 | Tags:Featured Articles Off Topic Insider malicious security

Making Mistakes in Security

At some point in your career, you will make mistakes—small mistakes, big mistakes, even career-defining mistakes. I am writing this in retrospect because during the course of my job duties, I recently made a mistake. The details are irrelevant, but I wanted to share my experience with making mistakes in the professional world.Mistakes and human error in Info
Publish At:2017-03-22 03:20 | Read:6924 | Comments:0 | Tags:Featured Articles Security Awareness Human Factor security

The Importance of a Strategic Response to Cyber Incidents

There are a variety of ways a company can experience cyber incidents, ranging from a distributed denial of service network attack to internal information theft.The first response is usually to enlist incident response professionals to resolve the issue as quickly and efficiently as possible. However, there are several factors companies should consider in det
Publish At:2017-03-21 08:55 | Read:3239 | Comments:0 | Tags:Featured Articles Risk-Based Security for Executives data br

Bringing Clarity to Really Really Big Data: A Case for AI and Machine Learning to Help Crunch and Protect Our Data

Funny how kids have an affinity for toys we enjoyed as kids. Like Legos. They will spend hours creating the biggest “thing”, often leading to a parent’s near universal response, “Johnny! That is the biggest tower I have ever seen! Great job!” Children (and we) love Legos because they foster imagination, offering a limitless way to create something “gigantic!
Publish At:2017-03-21 08:55 | Read:3830 | Comments:0 | Tags:Featured Articles IT Security and Data Protection AI cyberse

Wireless Routers: First Line of Defense

Almost everything you read or hear about routers includes a sentence or two about router security. The focus is generally on this essential piece of hardware as the first line of defense in an internet-connected world. Many medium-sized companies and large corporations take this into account when they purchase and set up their network infrastructure.They ten
Publish At:2017-03-20 14:30 | Read:3739 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Network Ro

Computer Security Disruption Tactics: Security Experts Race On To Catch The Hackers

It’s now evident there are many more hacker intrusions during which security experts struggle to repel attackers and resolve damage than we first thought. The growing trends of sabotage, extortion, and disruption of both individual users and critical services have raised concerns about cybersecurity worldwide.Cybersecurity Threats Are a Leading Cause o
Publish At:2017-03-20 14:30 | Read:3173 | Comments:0 | Tags:Cyber Security Featured Articles disruption hackers security

Yahoo! Bleeds for the Protection of Customer Data

On March 1, Marissa Mayer, Yahoo!’s Chief Executive Office, gave up millions of dollars. As she noted in a blog post on Tumblr, “I am the CEO of the company [Yahoo!] and since this incident happened during my tenure, I have agreed to forgo my annual bonus and my annual equity grant.” All in, Mayer gave up upwards of 2 million in cash bonuses and millions mor
Publish At:2017-03-17 12:35 | Read:2900 | Comments:0 | Tags:Cyber Security Featured Articles breach data Yahoo

VERT Threat Alert: March 2017 Patch Tuesday Analysis

Today’s VERT Alert addresses 18 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins and expects to ship ASPL-716 on Wednesday, March 15th.Ease of Use (published exploits) to Risk TableAutomated ExploitEasyModerateDifficultExtremely DifficultMS17-006MS17-007MS17-008MS17-013MS17-014MS17-017MS17-018 MS17-012No Known Exploi
Publish At:2017-03-15 23:31 | Read:4724 | Comments:0 | Tags:Featured Articles Vulnerability Management Adobe microsoft P

Is Security Ready for the Next 20 Years of Technology?

It doesn’t seem that long ago that we didn’t have online access to many of our utility, banking, and/or even shopping accounts.I was fortunate enough to be part of a revolutionary project at a university in southern England back in 1988, where accessing the internet was using a 1200 baud modem, a terminal emulator connecting via a mainframe that consumed two
Publish At:2017-03-15 23:30 | Read:6358 | Comments:0 | Tags:Featured Articles Security Awareness Security Controls secur

4 Best Practices for Improving Your Organization’s Supply Chain Security

Digital attackers have many different strategies for infiltrating a target organization. That even goes for companies with robust perimeter defenses. Bad actors simply need to find a soft target they can exploit. Oftentimes, they find what they’re looking for along a target’s supply chain.We can best understand the supply chain as a network of pe
Publish At:2017-03-15 05:05 | Read:2443 | Comments:0 | Tags:Featured Articles IT Security and Data Protection IT supply

The Subversive Six – Hidden Risk Points in Your ICS

I was lucky enough to be at the event at which Sean McBride initially spoke about potatoes. Who doesn’t love a good potato? It was actually a succinct outline of a process in agriculture that takes place every day, outlining pinch points of a potato harvester that could illicit physical harm to the workers performing their everyday jobs.It was a nice metapho
Publish At:2017-03-15 05:05 | Read:5544 | Comments:0 | Tags:Featured Articles ICS Security ics organization risk

Tape Over Your Hard Drive Lights: The Latest Security Hardening Measure

When hard disk drives contain super sensitive data, cybersecurity professionals like myself will usually recommend that they shouldn’t be placed in any computers that have an operational TCP/IP stack. There are various ways that internet-connected computers can secure themselves against attack, such as firewalls, IPS devices, antivirus software, and OS
Publish At:2017-03-14 10:40 | Read:2921 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Air-Gapped


Share high-quality web security related articles with you:)


Tag Cloud