HackDig : Dig high-quality web security articles

Turning a Pico into a Human Interface Device (HID)

I just walked out of room 716 at SecTor here in Toronto, where I shared details on my Raspberry Pi Pico project. I’m happy that I was finally able to share this and even happier to announce that the GitHub repo is now open to the public. I won’t walk you through the code, but you can reach out to me if you have questions.  So, what i
Publish At:2022-10-06 12:00 | Read:605064 | Comments:0 | Tags:Featured Articles IT Security and Data Protection IoT Hack L

4 tips to achieve Data Compliance

Data compliance is a crucial and essential factor in organizations that should be carefully followed for data management. Data compliance is more than maintaining relevant standards and regulations and ensuring that the data is secured. The substantial amount of data that is processed and used in organizations must be managed properly. All phases of data acc
Publish At:2022-10-05 23:54 | Read:642483 | Comments:0 | Tags:Featured Articles IT Security and Data Protection compliance

UK Construction: Cybersecurity Experts Defend Joint Ventures

After years of falling behind, the construction industry has realised the importance of its data. Construction-related businesses invested a remarkable 188% more in cybersecurity in 2018–19. Data leaks and cyberattacks have jolted sectors worldwide, affecting everyone. 55% of UK businesses experienced a cyberattack in 2019 alone, and the average damage resul
Publish At:2022-10-02 23:53 | Read:775673 | Comments:0 | Tags:Featured Articles IT Security and Data Protection best pract

IT admin admits sabotaging ex-employer’s network in bid for higher salary

A 40-year-old man could face up to 10 years in prison, after admitting in a US District Court to sabotaging his former employer’s computer systems.Casey K Umetsu, of Honolulu, Hawaii, has pleaded guilty to charges that he deliberately misdirected a financial company’s email traffic and prevented customers from reaching its website in a failed att
Publish At:2022-09-29 11:59 | Read:579367 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Administra

Your Guide to the Latest Email Fraud and Identity Deception Trends

There’s a high chance that you or someone you know has been impacted by email fraud or identity theft. At the very least, you’ve likely received a variety of spam emails and text messages asking to provide a payment or confirm your identity.The good news is that cybersecurity protection is constantly evolving and improving, with cybersecurity education progr
Publish At:2022-09-27 23:53 | Read:1032641 | Comments:0 | Tags:Featured Articles IT Security and Data Protection email scam

Top Phishing and Social Media Threats: Key Findings from the Quarterly Threat Trends & Intelligence Report

In today’s online landscape, it is crucial for organizations to stay on top of the threats that put their enterprises at risk. Agari and PhishLabs have put together their Quarterly Threat Trends & Intelligence Report detailing their analysis of phishing and social media attacks this quarter. The report presents statistics regarding the volume of attacks,
Publish At:2022-09-20 23:55 | Read:674184 | Comments:0 | Tags:IT Security and Data Protection Phishing social media Tactic

SecTor 2022: The Power of the Pico

I’m excited to share that I will be speaking at SecTor this year in the tools track. While the SecTor schedule is not yet finalized, I’m currently listed as speaking at 10:15am on October 6th. The talk, The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico, will cover how to use a Raspberry Pi Pico to perform BadUSB attacks. There are co
Publish At:2022-09-20 23:55 | Read:611412 | Comments:0 | Tags:Featured Articles IT Security and Data Protection BadUSB hac

What Are Privacy-Enhancing Technologies (PETs)? A Comprehensive Guide

Modern enterprises will have to work with customer data in one way or another. The COVID-19 pandemic proved that the only businesses that would survive the future were those willing to embrace technology. While technologies such as the Internet of Things, and artificial intelligence have undeniable benefits, they have also presented complications. Manag
Publish At:2022-09-20 23:55 | Read:688473 | Comments:0 | Tags:IT Security and Data Protection cryptography data data prote

The ClubCISO report reveals a fundamental shift in security culture

With business and technology becoming increasingly intertwined, organizations are being forced to rethink how they look at digital security. Once overlooked or viewed as a mere afterthought, today it has become a business-critical necessity. As a result, organizations across industry lines are racing to improve their security postures. Chief Information Secu
Publish At:2022-09-11 23:53 | Read:1207398 | Comments:0 | Tags:Featured Articles IT Security and Data Protection CISO Infor

How to Correctly Classify Your Data in 2022

Data classification can feel like an overwhelming task, especially for organizations without a strong practice in place. As with any security approach, data classification is both crucial and tempting to avoid. Regardless of whether the value is recognized, there’s a chance that it gets pushed further and further down the priority list in favor of items that
Publish At:2022-09-11 23:53 | Read:652434 | Comments:0 | Tags:Featured Articles IT Security and Data Protection compliance

Warning issued about Vice Society ransomware gang after attacks on schools

A ransomware gang that has been increasingly disproportionately targeting the education sector is the subject of a joint warning issued by the FBI, CISA, and MS-ISAC.The Vice Society ransomware group has been breaking into schools and colleges, exfiltrating sensitive data, and demanding ransom payments. The threat? If the extortionists aren’t paid, you
Publish At:2022-09-08 11:59 | Read:712324 | Comments:0 | Tags:IT Security and Data Protection CIS CISA FBI ransomware rans

Working Abroad as a Cybersecurity Professional: What You Need to Know

The world is becoming a smaller place. The prospect of working in another country becomes increasingly realistic and even promising as businesses migrate toward the cloud and collaborate more closely with international partners. Amid this shift, cybersecurity professionals may wonder if they can work abroad.Cybersecurity is a worldwide concern, creating plen
Publish At:2022-09-07 23:53 | Read:868226 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cybersecur

CISO Interview Series: The thinking of a CISO at the front end of the cyber threat landscape.

What are the most important areas for a CISO to focus on?  When speaking to Aman Sood, it becomes clear that the job of a CISO encompasses every aspect of a business.  Aman is the Head of Cyber Security with Jimdo, a website building platform that helps small businesses start, grow, and ultimately thrive online.  Aman is also the Cyber Securit
Publish At:2022-09-06 23:53 | Read:1051662 | Comments:0 | Tags:IT Security and Data Protection CISO Cyberattacks Interview

FBI issues warning after crypto-crooks steal $1.3 billion in just three months

Amid a wave of hacks that have cost investors billions of dollars worth of cryptocurrency, the FBI is calling on decentralised finance (DeFi) platforms to improve their security.In a warning posted on its website, the FBI said that cybercriminals are increasingly targeting DeFi platforms to steal cryptocurrency, often exploiting vulnerabilities in smart cont
Publish At:2022-09-01 14:35 | Read:548930 | Comments:0 | Tags:IT Security and Data Protection cryptocurrency cybercriminal

Key Points from the IBM Cost of a Data Breach Report 2022

The volume and impact of data breaches have accelerated largely in 2022, which has contributed to many adverse effects for businesses. Tc highlights several updated factors that have generated great costs across 17 countries and regions, and 17 industries. The report has included new related areas of analysis such as:Extended Detection and Response (XDR).Ris
Publish At:2022-08-28 19:21 | Read:800258 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Cost of Da


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud