HackDig : Dig high-quality web security articles for hackers

File-sharing and cloud storage sites: How safe are they?

There it is again—that annoying message that pops up when your email client informs you that a file is too big to attach. Those of us that are confronted with this problem on a regular basis—and those of us that want to attach files that could get picked up by anti-malware scanners along the way—have probably resorted to using file-sharing sites to help solv
Publish At:2020-12-04 16:00 | Read:299 | Comments:0 | Tags:Awareness How-tos advertising file-sharing notifications onl

Surviving college distance learning during the pandemic: a cybersecurity guide

Social distancing, the wearing of face masks, practicing hand hygiene, and disinfecting often-touched surfaces have become human necessities during the pandemic era. For schools, they’ve also had to adapt quickly to incorporate distance learning methods that let students continue their studies. But being in crisis management mode didn’t give higher
Publish At:2020-11-12 13:35 | Read:254 | Comments:0 | Tags:How-tos college cybersecurity distance learning multilayer c

How to keep K–12 distance learners cybersecure this school year

With the pandemic still in full swing, educational institutions across the US are kicking off the 2020–2021 school year in widely different ways, from re-opening classrooms to full-time distance learning. Sadly, as schools embracing virtual instruction struggle with compounding IT challenges on top of an already brittle infrastructure, they are nowhere near
Publish At:2020-09-02 15:53 | Read:477 | Comments:0 | Tags:How-tos back to school back to school cybersecurity covid-19

Website misconfigurations and other errors to avoid

Website owners, listen up: There are lots of things you shouldn’t do with your site, and many more you should avoid with the domains you’re responsible for. Insider malice, bad luck, and the stars aligning in impossible ways can all give your online portfolio a bad hair day. However, if you want to tempt fate, you can bring on the mayhem with website misconf
Publish At:2020-07-15 11:33 | Read:546 | Comments:0 | Tags:How-tos bank banking blog CMS dns hijack redirect website

Coughing in the face of scammers: security tips for the 2020 tax season

In spite of everything happening in the world right now—the 2020 tax season is about to come to an end, and taxes are due. Americans got a reprieve back in March when the US Treasury Department and Internal Revenue Service (IRS) announced they were pushing back the federal income tax filing due date from April 15 to July 15, 2020. Fast forward three month
Publish At:2020-06-24 14:10 | Read:672 | Comments:0 | Tags:How-tos 2019 taxes 2020 tax season coronavirus coronavirus t

Teaching from home might become part of every teachers’ job description

“Hey Joe, I wanted to remind you that starting next Monday you will be expected to teach from home. The lesson material is in your inbox along with the list of pupils that are expected to follow them. We are sure it will take some adjustments, but we trust that by working together we can make the best of the current situation.  If you have any questions
Publish At:2020-06-03 15:46 | Read:634 | Comments:0 | Tags:How-tos data protection privacy security students teachers t

10 best practices for MSPs to secure their clients and themselves from ransomware

Lock-downs and social distancing may be on, but when it comes to addressing the need for IT support—whether by current of potential clients—it’s business as usual for MSPs. And, boy, is it a struggle. On the one hand, they keep an eye on their remote workers to ensure they’re still doing their job securely and safely in the comfort of their own homes.
Publish At:2020-05-24 07:20 | Read:912 | Comments:0 | Tags:How-tos account management B2B backup backups best MSP pract

Cloud data protection: how to secure what you store in the cloud

The cloud has become the standard for data storage. Just a few years ago, individuals and businesses pondered whether or not they should move to the cloud. This is now a question of the past. Today, the question isn’t whether to adopt cloud storage but rather how. Despite its rapid pace of adoption, there are some lingering concerns around cloud sto
Publish At:2020-05-03 14:39 | Read:1134 | Comments:0 | Tags:How-tos cloud cloud data cloud data protection cloud securit

Keep Zoombombing cybercriminals from dropping a load on your meetings

While shelter in place has left many companies struggling to stay in business during the COVID-19 epidemic, one company in particular has seen its fortunes rise dramatically. Zoom, the US-based maker of teleconferencing software, has become the web conference tool of choice for employees working from home (WFH), friends coming together for virtual happy hour
Publish At:2020-04-14 14:25 | Read:1169 | Comments:0 | Tags:How-tos coronavirus covid-19 exploit exploits how-to zoom te

Security tips for working from home (WFH)

Over the last decade, remote work and working from home has grown in popularity for many professionals. In fact, a 2018 study found more than 70 percent of global employees work remotely at least once per week. However, the coronavirus pandemic and resulting lockdown in many parts of the world have forced a large number of employees into unfamiliar
Publish At:2020-03-19 14:26 | Read:984 | Comments:0 | Tags:How-tos coronavirus password remote remote work remote worke

How to prevent a rootkit attack

If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of the most dangerous cyberthreats today. Rootkits are a type of malware designed to stay undetected on your computer. Cybercriminals use rootkits to remotely access and control your machine, burrowing deep into the system like a latche
Publish At:2020-01-14 16:55 | Read:1167 | Comments:0 | Tags:How-tos application rootkits bootloader firmware rootkits ha

Dubious downloads: How to check if a website and its files are malicious

A significant amount of malware infections and potentially unwanted program (PUP) irritants are the result of downloads from unreliable sources. There are a multitude of websites that specialize in distributing malicious payloads by offering them up as something legitimate or by bundling the desired installer with additional programs. In November 2019, w
Publish At:2020-01-07 16:50 | Read:981 | Comments:0 | Tags:How-tos certificate checksum download padlock scan trusted

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more so than your Average Joe. Whether a reporter is trying to crowd-source information without revealing their story or operating in a country where freedom of the press is a pipe dream, cybersecurity plays an important role for any journ
Publish At:2019-11-11 23:20 | Read:1646 | Comments:0 | Tags:How-tos communication data eavesdropping encrypted journalis

How to protect yourself from doxing

“Abandon hope all ye who enter.” This ominous inscription affixed atop the gates to Hell in Dante’s Divine Comedy applies peculiarly well to describe the state of the Internet today. It’s hard to draw a parallel to the utility that the Internet has offered to modern civilization—perhaps no other technological innovation has brought about greater chan
Publish At:2019-10-25 16:50 | Read:1602 | Comments:0 | Tags:How-tos dox doxer doxing IP address mobile VPNs online priva

Truth in malvertising: How to beat bad ads

Here’s a scary number: 1.3 billion. That’s the monthly traffic of msn.com, which was hit by a malvertising campaign earlier this year. Here’s an even scarier number: 70 percent. That’s the estimated amount of malvertising campaigns that deliver ransomware as a payload. What’s 70 percent of millions and millions of pageviews that
Publish At:2016-06-14 01:00 | Read:4029 | Comments:0 | Tags:101 How-tos exploits malicious ads malvertising ransomware

Tools

Tag Cloud