HackDig : Dig high-quality web security articles for hacker

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more so than your Average Joe. Whether a reporter is trying to crowd-source information without revealing their story or operating in a country where freedom of the press is a pipe dream, cybersecurity plays an important role for any journ
Publish At:2019-11-11 23:20 | Read:253 | Comments:0 | Tags:How-tos communication data eavesdropping encrypted journalis

How to protect yourself from doxing

“Abandon hope all ye who enter.” This ominous inscription affixed atop the gates to Hell in Dante’s Divine Comedy applies peculiarly well to describe the state of the Internet today. It’s hard to draw a parallel to the utility that the Internet has offered to modern civilization—perhaps no other technological innovation has brought about greater chan
Publish At:2019-10-25 16:50 | Read:339 | Comments:0 | Tags:How-tos dox doxer doxing IP address mobile VPNs online priva

Truth in malvertising: How to beat bad ads

Here’s a scary number: 1.3 billion. That’s the monthly traffic of msn.com, which was hit by a malvertising campaign earlier this year. Here’s an even scarier number: 70 percent. That’s the estimated amount of malvertising campaigns that deliver ransomware as a payload. What’s 70 percent of millions and millions of pageviews that
Publish At:2016-06-14 01:00 | Read:3007 | Comments:0 | Tags:101 How-tos exploits malicious ads malvertising ransomware

Facebook and Privacy

Is there such a thing as privacy on Facebook, you might ask? Seeing how everything that you post or gets posted about you (or that you get tagged in) is public knowledge unless you do something about it, the answer is as with most social media: it depends on how you use it. In this post, we will try to give you some tips without going into much detail on how
Publish At:2016-06-02 14:20 | Read:3726 | Comments:0 | Tags:101 How-tos facebook privacy social media

Process Explorer: part 2

For Windows operating systems (OS), especially those up to and including Windows 7, Process Explorer is an excellent replacement for Task Manager. After publishing part 1: an introduction I received some questions, requests and comments that I will try to cover here. (Stop) Replacing Task Manager First of all I was asked to mention that undoing the replaceme
Publish At:2016-05-28 06:35 | Read:4859 | Comments:0 | Tags:101 How-tos color coding handles Pieter Arntz process explor

How to tell if you’re infected with malware

Picture this: you start your computer and wait. And wait. And wait some more. When your desktop finally shows its face, things don’t get any better. Your Internet is sluggish, your programs are taking forever to load, and your cursor is dragging 20 seconds behind your mouse. You might have tried to open too many programs at once. Or… You might be infec
Publish At:2016-05-06 23:35 | Read:2546 | Comments:0 | Tags:101 How-tos computer running slow malware infection mobile s

Process Explorer: An introduction

When Microsoft acquired Sysinternals in 2006, one of the most famous tools it gained was Process Explorer. For Windows operating systems (OS), especially those up to and including Windows 7, Process Explorer is an excellent replacement for Task Manager. It offers a much clearer view of what is going on and has a lot more options. Besides the options the regu
Publish At:2016-05-03 22:35 | Read:4378 | Comments:0 | Tags:101 How-tos malware Pieter Arntz process explorer sysinterna


Share high-quality web security related articles with you:)


Tag Cloud