HackDig : Dig high-quality web security articles

Recovering Ransom Payments: Is This the End of Ransomware?

What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged sword since even crypto leaves a money trail. Recovering ransomware payouts could lead to a sharp decline in exploits. Ransomware is still today’s top att
Publish At:2022-06-02 10:19 | Read:467 | Comments:0 | Tags:Advanced Threats Risk Management Security Services Cryptocur

Looking over your shoulder: when small mistakes have big consequences

p>People up to no good get themselves caught in an endless number of ways. This has always been the case in the real world, and continues to be true online. No matter how talented, how daring the schemes, greed and the desire for fame often win out. This has disastrous consequences for those caught, and a little more illumination for those of us taking part
Publish At:2022-03-29 08:57 | Read:813 | Comments:0 | Tags:Privacy accident caught error forums hackers hacks mistake s

Clouding the issue: what cloud threats lie in wait in 2022?

As more services move ever cloud-wards, so too do thoughts by attackers as to how best exploit them. With all that juicy data sitting on someone else’s servers, it’s essential that they run a tight ship. You’re offloading some of your responsibility onto a third party, and sometimes things can go horribly wrong as a result. Whether it’s the third party being
Publish At:2022-03-17 12:47 | Read:2687 | Comments:0 | Tags:Cybercrime cloud cryptocurrency cryptowallet exploits hacks

Explosive technology and 3D printers: a history of deadly devices

Hackers: They’ll turn your computer into a BOMB! “Hackers turning computers into bombs” is a now legendary headline, taken from the Weekly World News. It has rather set the bar for “people will murder you with computers” anxiety. Even those familiar with the headline may not have dug into the story too much on account of how silly
Publish At:2020-08-14 19:52 | Read:2940 | Comments:0 | Tags:Hacking 3d printer hackers hacking hacks hardware IoT malwar

A Security Professional’s Cheat Sheet for the Holidays: Hacks, Breaches and More!

It’s the holiday season, and if you are an IT security professional like me, going home for the holidays often means you are the designated briefing correspondent on all things data breaches. This year, instead of trying to explain IT jargon to my friends and family, I decided to compile a list of 2016 breaches and security incidents that will be sure
Publish At:2016-12-23 00:40 | Read:6259 | Comments:0 | Tags:Data Protection Identity & Access Data Breach Hacking hacks

Lessons From Recent Hacks: Creating Strong Passwords

Breaches involving stolen credentials don’t surprise anyone these days. Those of us in infosec know too well that it’s a thousand times easier for the bad guys to gain access to a network and fly under the radar with a stolen login—often obtained through social engineering—than it is to get through cyber defenses. From the bad actors’ perspective, why pick t
Publish At:2016-07-19 07:15 | Read:8340 | Comments:0 | Tags:Featured Articles Security Awareness Hacks passwords securit

Garbage in, garbage out: Why Ars ignored this week’s massive password breach

Earlier this week, mass panic ensued when a security firm reported the recovery of a whopping 272 million account credentials belonging to users of Gmail, Microsoft, Yahoo, and a variety of overseas services. "Big data breaches found at major email services" warned Reuters, the news service that broke the news. Within hours, other news services were running
Publish At:2016-05-07 03:10 | Read:5293 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab breaches hacks

Comcast Home Security System Vulnerable to Attack

Update Comcast’s Xfinity Home Security System is vulnerable to attacks that interfere with its ability to detect and alert to home intrusions.Researchers at Rapid7 today disclosed the issue after fruitless attempts to contact and report the problem to Comcast dating back to Nov. 2; Rapid7 did disclose the vulnerability to CERT, which is expected to iss
Publish At:2016-01-06 03:20 | Read:10374 | Comments:0 | Tags:Critical Infrastructure Hacks Privacy base station Comcast C

Six Things to Watch for in 2016

Well, if you thought you had it rough in 2014 because of big, bad Poodles and an irritating case of Heartbleed, things only got worse this year. Rather than intrusions permeating our IT systems and stealing our data, attacks got a bit more personal in 2015. Not only were privacy and civil liberties put at risk by legislators pushing overbearing rules based o
Publish At:2015-12-31 20:45 | Read:11575 | Comments:0 | Tags:Hacks Malware Vulnerabilities Web Security apt car hacking h

Twitter Warns Some users of Nation-State Attacks

A relatively small number of Twitter users, including a few connected to security and privacy advocacy, have been informed that their accounts have been targeted by state-sponsored hackers.Notifications began appearing in the inboxes of affected users two days ago, with very little concrete information accompanying the warning. Twitter said in the notifica
Publish At:2015-12-14 12:50 | Read:10979 | Comments:0 | Tags:Government Hacks Privacy Web Security coldhak Runa Sandvik s

Internet Root Name Servers Survive Unusual DDoS Attack

An unusual DDoS amplification attack was carried out 10 days ago against many of the Internet’s 13 root name servers, the authoritative servers used to resolve IP addresses.The attacks happened on Nov. 30 and again on Dec. 1, and each time, massive volumes of traffic, peaking at five million queries per second, were fired at the servers. A note from th
Publish At:2015-12-10 00:20 | Read:5662 | Comments:0 | Tags:Hacks Web Security BCP-38 DDoS DDoS Amplification attack DNS

China APT Gang Targets Hong Kong Media via Dropbox

An APT gang linked to China and alleged to be responsible for targeted attacks against foreign governments and ministries, has now pointed its focus inward at China’s autonomous territory Hong Kong.An August attack against several media companies in Hong Kong was carried out shortly after a high-profile controversy over an appointment at the prestigiou
Publish At:2015-12-01 17:25 | Read:5715 | Comments:0 | Tags:Government Malware Web Security admin@338 advanced persisten

Lenovo Patches Vulnerabilities in System Update Service

Lenovo has patched two serious vulnerabilities that hackers could abuse in targeted attacks, or at scale, to easily guess administrator passwords on a compromised device, or elevate privileges to Windows SYSTEM user.The vulnerabilities were patched last Thursday by the manufacturer and details were disclosed Tuesday by researchers at IOActive, who privately
Publish At:2015-11-25 16:45 | Read:6051 | Comments:0 | Tags:Hacks Vulnerabilities IOActive Lenovo System Update patch Le

FBI Warns Public Officials of Doxing Threat

The FBI has put law enforcement and high-profile public officials on notice that they could be targeted by hacktivists following the recent doxing of CIA director John Brennan by the hacktivism collective called Crackas With Attitude.Brennan’s AOL email account was taken over by a teen associated with the group who posed as a Verizon employee to steal
Publish At:2015-11-20 10:10 | Read:6669 | Comments:0 | Tags:Government Hacks Privacy Social Engineering CIA Director Cra

One BadBarcode Spoils Whole Bunch

Barcodes’ pervasiveness in retail, health care and other service industries notwithstanding, hackers really haven’t paid much attention to these tiny lines of data.But like other technologies supporting the so-called Internet of Things, there are bound to be vulnerabilities and there are bound to be white hats and black hats poking about. Case
Publish At:2015-11-13 15:50 | Read:5887 | Comments:0 | Tags:Hacks Uncategorized Vulnerabilities Web Security BadBarcode


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud