HackDig : Dig high-quality web security articles for hackers

The Future of Work: Being Successful in the COVID Era and Beyond

Reading Time: ~ 3 min. Working from home is no longer something some of us can get away with some of the time. It’s become essential for our health and safety. So, what does the future of work look like in a post-COVID world? We asked some of our cybersecurity and tech experts for their insights, which we’ll be presenting in a series entitled The Future
Publish At:2020-06-02 08:14 | Read:110 | Comments:0 | Tags:Featured Posts SMBs remote work

Simplified Two-factor Authentication for Webroot

Reading Time: ~ 1 min. Webroot has evolved its secure login offering from a secondary security code to a full two-factor authentication (2FA) solution for both business and home users. Webroot’s 2FA has expanded in two areas. We have: Implemented a time-based, one-time password (TOTP) solution that generates a passcode which is active for only a short
Publish At:2019-11-22 15:10 | Read:439 | Comments:0 | Tags:Featured Posts Product Blog

Cookies, Pixels, and Other Ways Advertisers are Tracking You Online

Reading Time: ~ 3 min. In May of 2018, the General Data Protection Regulation (GDPR) came into effect in the EU. Seemingly overnight, websites everywhere started throwing pop-ups to inform us about their use of cookies and our privacy rights. While the presence of the pop-ups may be reassuring to some (and annoying to others), the real issue is that very few
Publish At:2019-10-17 16:10 | Read:1109 | Comments:0 | Tags:Featured Posts Home + Mobile

Online Gaming Risks and Kids: What to Know and How to Protect Them

Reading Time: ~ 4 min. Online games aren’t new. Consumers have been playing them since as early as 1960. However, the market is evolving—games that used to require the computing power of dedicated desktops can now be powered by smartphones, and online gaming participation has skyrocketed. This unfortunately means that the dangers of online gaming have evolve
Publish At:2019-10-10 16:10 | Read:3336 | Comments:0 | Tags:Featured Posts Home + Mobile antivirus privacy

STEM for Kids: Why Does it Matter?

Reading Time: ~ 3 min. You have probably seen or heard news reports about STEM education (Science, Technology, Engineering, and Math), and how important STEM jobs are for the economy; or maybe you’ve heard reports on schools that are making strides to improve their STEM programs for kids. It’s important for parents with school-aged c
Publish At:2019-09-26 21:10 | Read:1476 | Comments:0 | Tags:Featured Posts Home + Mobile

Thoughtful Design in the Age of Cybersecurity AI

Reading Time: ~ 3 min. AI and machine learning offer tremendous promise for humanity in terms of helping us make sense of Big Data. But, while the processing power of these tools is integral for understanding trends and predicting threats, it’s not sufficient on its own. Thoughtful design of threat intelligence—design that accounts for the ultimate needs
Publish At:2019-09-19 15:40 | Read:878 | Comments:0 | Tags:Business + Partners Featured Posts Threat Intelligence artif

Keeping Your Vehicle Secure Against Smart Car Hacks

Reading Time: ~ 3 min. An unfortunate reality of all smart devices is that, the smarter they get, and the more integrated into our lives they become, the more devastating a security breach can be. Smart cars are no exception. On the contrary, they come with their own specific set of vulnerabilities. Following high-profile incidents like the infamous Jeep hac
Publish At:2019-09-19 15:40 | Read:879 | Comments:0 | Tags:Featured Posts Home + Mobile


Share high-quality web security related articles with you:)


Tag Cloud