HackDig : Dig high-quality web security articles for hackers

Coughing in the face of scammers: security tips for the 2020 tax season

In spite of everything happening in the world right now—the 2020 tax season is about to come to an end, and taxes are due. Americans got a reprieve back in March when the US Treasury Department and Internal Revenue Service (IRS) announced they were pushing back the federal income tax filing due date from April 15 to July 15, 2020. Fast forward three month
Publish At:2020-06-24 14:10 | Read:140 | Comments:0 | Tags:How-tos 2019 taxes 2020 tax season coronavirus coronavirus t

Teaching from home might become part of every teachers’ job description

“Hey Joe, I wanted to remind you that starting next Monday you will be expected to teach from home. The lesson material is in your inbox along with the list of pupils that are expected to follow them. We are sure it will take some adjustments, but we trust that by working together we can make the best of the current situation.  If you have any questions
Publish At:2020-06-03 15:46 | Read:145 | Comments:0 | Tags:How-tos data protection privacy security students teachers t

10 best practices for MSPs to secure their clients and themselves from ransomware

Lock-downs and social distancing may be on, but when it comes to addressing the need for IT support—whether by current of potential clients—it’s business as usual for MSPs. And, boy, is it a struggle. On the one hand, they keep an eye on their remote workers to ensure they’re still doing their job securely and safely in the comfort of their own homes.
Publish At:2020-05-24 07:20 | Read:239 | Comments:0 | Tags:How-tos account management B2B backup backups best MSP pract

Cloud data protection: how to secure what you store in the cloud

The cloud has become the standard for data storage. Just a few years ago, individuals and businesses pondered whether or not they should move to the cloud. This is now a question of the past. Today, the question isn’t whether to adopt cloud storage but rather how. Despite its rapid pace of adoption, there are some lingering concerns around cloud sto
Publish At:2020-05-03 14:39 | Read:471 | Comments:0 | Tags:How-tos cloud cloud data cloud data protection cloud securit

Keep Zoombombing cybercriminals from dropping a load on your meetings

While shelter in place has left many companies struggling to stay in business during the COVID-19 epidemic, one company in particular has seen its fortunes rise dramatically. Zoom, the US-based maker of teleconferencing software, has become the web conference tool of choice for employees working from home (WFH), friends coming together for virtual happy hour
Publish At:2020-04-14 14:25 | Read:578 | Comments:0 | Tags:How-tos coronavirus covid-19 exploit exploits how-to zoom te

Security tips for working from home (WFH)

Over the last decade, remote work and working from home has grown in popularity for many professionals. In fact, a 2018 study found more than 70 percent of global employees work remotely at least once per week. However, the coronavirus pandemic and resulting lockdown in many parts of the world have forced a large number of employees into unfamiliar
Publish At:2020-03-19 14:26 | Read:504 | Comments:0 | Tags:How-tos coronavirus password remote remote work remote worke

How to prevent a rootkit attack

If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of the most dangerous cyberthreats today. Rootkits are a type of malware designed to stay undetected on your computer. Cybercriminals use rootkits to remotely access and control your machine, burrowing deep into the system like a latche
Publish At:2020-01-14 16:55 | Read:691 | Comments:0 | Tags:How-tos application rootkits bootloader firmware rootkits ha

Dubious downloads: How to check if a website and its files are malicious

A significant amount of malware infections and potentially unwanted program (PUP) irritants are the result of downloads from unreliable sources. There are a multitude of websites that specialize in distributing malicious payloads by offering them up as something legitimate or by bundling the desired installer with additional programs. In November 2019, w
Publish At:2020-01-07 16:50 | Read:493 | Comments:0 | Tags:How-tos certificate checksum download padlock scan trusted

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more so than your Average Joe. Whether a reporter is trying to crowd-source information without revealing their story or operating in a country where freedom of the press is a pipe dream, cybersecurity plays an important role for any journ
Publish At:2019-11-11 23:20 | Read:1139 | Comments:0 | Tags:How-tos communication data eavesdropping encrypted journalis

How to protect yourself from doxing

“Abandon hope all ye who enter.” This ominous inscription affixed atop the gates to Hell in Dante’s Divine Comedy applies peculiarly well to describe the state of the Internet today. It’s hard to draw a parallel to the utility that the Internet has offered to modern civilization—perhaps no other technological innovation has brought about greater chan
Publish At:2019-10-25 16:50 | Read:972 | Comments:0 | Tags:How-tos dox doxer doxing IP address mobile VPNs online priva

Truth in malvertising: How to beat bad ads

Here’s a scary number: 1.3 billion. That’s the monthly traffic of msn.com, which was hit by a malvertising campaign earlier this year. Here’s an even scarier number: 70 percent. That’s the estimated amount of malvertising campaigns that deliver ransomware as a payload. What’s 70 percent of millions and millions of pageviews that
Publish At:2016-06-14 01:00 | Read:3602 | Comments:0 | Tags:101 How-tos exploits malicious ads malvertising ransomware

Facebook and Privacy

Is there such a thing as privacy on Facebook, you might ask? Seeing how everything that you post or gets posted about you (or that you get tagged in) is public knowledge unless you do something about it, the answer is as with most social media: it depends on how you use it. In this post, we will try to give you some tips without going into much detail on how
Publish At:2016-06-02 14:20 | Read:4482 | Comments:0 | Tags:101 How-tos facebook privacy social media

Process Explorer: part 2

For Windows operating systems (OS), especially those up to and including Windows 7, Process Explorer is an excellent replacement for Task Manager. After publishing part 1: an introduction I received some questions, requests and comments that I will try to cover here. (Stop) Replacing Task Manager First of all I was asked to mention that undoing the replaceme
Publish At:2016-05-28 06:35 | Read:10061 | Comments:0 | Tags:101 How-tos color coding handles Pieter Arntz process explor

How to tell if you’re infected with malware

Picture this: you start your computer and wait. And wait. And wait some more. When your desktop finally shows its face, things don’t get any better. Your Internet is sluggish, your programs are taking forever to load, and your cursor is dragging 20 seconds behind your mouse. You might have tried to open too many programs at once. Or… You might be infec
Publish At:2016-05-06 23:35 | Read:3064 | Comments:0 | Tags:101 How-tos computer running slow malware infection mobile s

Process Explorer: An introduction

When Microsoft acquired Sysinternals in 2006, one of the most famous tools it gained was Process Explorer. For Windows operating systems (OS), especially those up to and including Windows 7, Process Explorer is an excellent replacement for Task Manager. It offers a much clearer view of what is going on and has a lot more options. Besides the options the regu
Publish At:2016-05-03 22:35 | Read:5168 | Comments:0 | Tags:101 How-tos malware Pieter Arntz process explorer sysinterna


Share high-quality web security related articles with you:)