HackDig : Dig high-quality web security articles for hacker

Virgin Media customers asked to change passwords over hacking alert

800.000 Virgin Media customers advised to change their passwords over imminent hack risk Virgin Media, one of UK’s larger Internet providers, has advised more than their 800.000 customers using a specific router (Super Hub 2), to change their passwords immediately after an investigation revealed they are prone to hacking. The warning comes after ethical secu
Publish At:2017-06-23 16:50 | Read:108 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

Are you the dream victim of a ransomware cybercriminal?

Ransomware attacks continue to be popular The recent ransomware attack against the NHS caused millions of pounds worth of damage – and put countless lives at risks when operations and general treatment had to be delayed. Despite the chaos, security experts believe that the criminals behind the attack made just $100,000 in the week after infection. Ransomware
Publish At:2017-06-16 19:05 | Read:187 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers

Should we worry that the UK General Election is hacked?

Should we worry about UK election tampering? When Donald Trump won the 2016 US Election, political experts were shocked – most had failed to predict that he would go on to become the President. The UK’s decision to leave the European Union earlier in the year had been similarly surprising – again, most had expected a narrow win for the “Remain” campaign. Sin
Publish At:2017-06-08 08:30 | Read:246 | Comments:838 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Avoiding Security Hype, the Hazard From Hollywood

If it’s summer, it must be Hollywood blockbuster season. Disaster! Horror! Explosions! Supervillains! But in the corporate world, it’s summer blockbuster season year-round. Networks of zombie bots! Twisted teenage genius hackers! The chills and thrills are dramatic, and they make for easy presentations. Give the audience enough explosions, and
Publish At:2017-06-06 08:50 | Read:235 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

How do you know if the leaks are real?

Is the Media Able to See the Difference Between Fake, Real and Tampered Leaks? Since President Donald Trump became POTUS, he has been accusing reputable sources of information such as BBC, NY Times, NBC News and CNN for being ‘fake news’. However, every single person, who has ever had to deal with these outlets, especially with publications such as BBC
Publish At:2017-06-06 01:15 | Read:208 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers Phishing

More Than Half a Billion Passwords Compromised

A security research firm discovered that there’s an anonymous database containing more than 560 million passwords. The database is accessible on the Dark Web, and it is a compilation of information exposed by all major leaks over the last five years. It includes stolen account information from security breaches of LinkedIn, DropBox, LastFM, MySpace, Adobe, N
Publish At:2017-06-01 22:05 | Read:296 | Comments:0 | Tags:Mobile News Security cybersecurity Hackers passwords

Can someone hack my drone?

Drones are gaining more and more popularity here in the US. They are no longer only a military tool able to operate thousands of miles away from us, but an easily accessible product available in almost every consumer electronics store in the US. Well, most of the ones sold in the stores may not be as powerful as the military ones, but they still are flying d
Publish At:2017-05-31 09:15 | Read:284 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Adylkuzz, the new virus that follows in WannaCry’s footsteps

Adylkuzz, the malware that steals virtual money from thousands of computers All investigations seem to indicate that WannaCry, the global attack that shocked the world last week, was just the tip of the iceberg in terms of cyber-security threats. The new cyber-attack currently underway, called Adylkuzz, is potentially much more dangerous than its predecessor
Publish At:2017-05-22 22:45 | Read:325 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers Virus

Who is listening? The problem of online microphones

What lurks in our microphones? Microphones play an important part in day-to-day life. We can talk with almost anyone in the world using our smartphones, tablets and laptops. We can even give our in-home smart technology instructions simply by speaking to it. But this power and convenience often means that microphones have to be left switched on – which means
Publish At:2017-05-17 13:40 | Read:291 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers Privacy

Are Hackers Holding Macron Hostage?

A massive hacking attack hit Emmanuel Macron’s Presidential campaign Seeing hackers intervene in elections is already starting to not feel like news anymore, but as to something that happens in every recent election, all over the world. On Sunday, Emmanuel Macron did not disappoint his supporters and won the presidential elections in France with a land
Publish At:2017-05-13 17:35 | Read:347 | Comments:0 | Tags:Mobile Security News cybersecurity Hackers Phishing

Asia Leading The Way: Pros and Cons of Future Smart Cities

Asia is the future leader in smart city initiatives It’s unlikely to surprise many that Asia has been named in a recent study as the global smart city leader of the future. The study, a Government Technology white paper titled “Evolution of Smart Cities and Connected Communities”, has singled out Asia as a future leader in smart city initiatives. Tech inclin
Publish At:2017-05-13 17:35 | Read:267 | Comments:0 | Tags:Mobile Security News cybersecurity Hackers IoT

What Size Companies Do Hackers Target?

Cybercriminals are after any size company that has access to people’s information. Over the last few years, we have seen so many news about stolen data information from large enterprises and agencies such as Yahoo, LinkedIn, CIA, and Google. However, these are not the real victims of the cyber-attacks. According to the recently released 2016 State of SMB Cyb
Publish At:2017-05-04 18:20 | Read:198 | Comments:0 | Tags:Business businesses Hackers

Turkey banned Wikipedia because its content web contents that represents a threat to national security

The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to national security. According to the telecommunications watchdog, Turkey has blocked the access to the online encyclopedia Wikipedia on Saturday, the Government has taken this decision citing a law that allows it to ban access
Publish At:2017-05-01 03:35 | Read:275 | Comments:0 | Tags:Breaking News Digital ID Security Censorship Hackers social

The New Battlefield: Why Nation-State Malware is Winning

This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use. So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lie
Publish At:2017-04-25 18:10 | Read:317 | Comments:0 | Tags:Government Threats Battlefield CIA criminals Federal governm

Hackers are after your intellectual property, not only your money

Sometimes hackers are not after your banking details or personal information After careful research and conversations with multiple individuals, we have discovered that sometimes hackers are not after your banking details or personal information. It may be tempting for them to steal directly from you but government agencies and antivirus companies are develo
Publish At:2017-04-20 14:20 | Read:443 | Comments:0 | Tags:Mobile News Security cybersecurity Hackers


Share high-quality web security related articles with you:)


Tag Cloud