HackDig : Dig high-quality web security articles for hackers

Stay Smart Online Week 2019

Let’s Reverse the Threat of Identity Theft!! Our online identities are critical. In fact, you could argue that they are our single most unique asset. Whether we are applying for a job, a mortgage or even starting a new relationship, keeping our online identity protected, secure and authentic is essential. This week is Stay Smart Online Week in Australia R
Publish At:2019-10-07 23:20 | Read:1549 | Comments:0 | Tags:Consumer Identity Protection antivirus cybercrime cybersafet

Aussies Fear Snakes, Spiders and Getting Hacked

Fears and phobias. We all have them. But what are your biggest ones? I absolutely detest snakes but spiders don’t worry me at all. Well, new research by McAfee shows that cybercriminals and the fear of being hacked are now the 5th greatest fear among Aussies. With news of data breaches and hacking crusades filling our news feed on a regular basis, many of us
Publish At:2019-10-02 11:20 | Read:1331 | Comments:0 | Tags:Consumer Identity Protection computer security cybercrime cy

How To Practise Good Social Media Hygiene

Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s largest dedicated cybersecurity firm, McAfee, has revealed that two thirds (67%) of Aussies are embarrassed by the content that appears on their social media profiles. Yikes! And just to make the picture even more complicated, 34% of Aussies adm
Publish At:2019-09-19 23:20 | Read:1025 | Comments:0 | Tags:Consumer Identity Protection credit card fraud cybercrime da

IRS shuts down identity security tool for taxpayers due to security problems

The Internal Revenue Service has temporarily suspended use of its Identity Protection PIN tool "as part of its ongoing security review," according to a notice issued by the IRS. The IP PIN is supposed to act as an extra layer of security for taxpayers who are at higher risk of becoming the victims of fraud because of personal information leaked in commercial
Publish At:2016-03-10 01:15 | Read:4382 | Comments:0 | Tags:Risk Assessment Technology Lab identity protection Identity

How to Spot a Splog

I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs. The word splog is a combination of the words spam and blog (from my perspective,
Publish At:2015-02-02 23:15 | Read:3989 | Comments:0 | Tags:Consumer Identity Protection malware online safety

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more likely to go undetected as he steals your belongings. But unlike the
Publish At:2015-01-26 21:00 | Read:4059 | Comments:0 | Tags:Consumer Identity Protection android antivirus computer secu

Redefining Privacy in the Information Age

If I had asked you a decade ago how you’d feel about people knowing and tracking your everyday whereabouts, your response would have likely been that it’s an invasion of your privacy. Or, you would have at least been a bit wierded out. If I told you that trotting after your every move and handing you department store sales offers, or ten cents off of the sam
Publish At:2015-01-26 21:00 | Read:4134 | Comments:0 | Tags:Consumer Family Safety Identity Protection Mobile Security D

What is ATM Skimming?

Ever hear of a crime called skimming? It may not be as dramatic a crime as assault or Ponzi schemes, but it can cause significant problems to you as your  savings account can be wiped out in a flash. Picture a scrawny nerd tampering with an automated teller machine (ATM)—the machine you use with your debit card to get cash. The thief places a device over the
Publish At:2015-01-12 20:15 | Read:4333 | Comments:1 | Tags:Consumer Identity Protection credit card fraud cybercrime id

The Guide to Securing Your New Tech Toys

Ho ho ho! It seems that this year, Santa’s sleigh was filled with technology—laptops, smartphones, gaming consoles, etc. Playing with and learning about your new tech toy is fun, but remember to secure your device. It would be a total bummer if your new toy was suddenly compromised by a virus or hacked into. Luckily, there are a few things you can do to prot
Publish At:2014-12-29 12:00 | Read:3456 | Comments:0 | Tags:Consumer Identity Protection antivirus computer security mob

Should You Use Near-Field Communications?

Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and ideas with my mind to others. My dream can sort of come true with near-field communications (NFC). You’ve might not have heard of NFC, but if you have a smartphone, there’s a good chance you’ve used it. If you have ever used Apple Pay or bumped your Galaxy smar
Publish At:2014-12-15 18:40 | Read:4182 | Comments:0 | Tags:Consumer Identity Protection Mobile Security android E-Comme

The (Digital) Christmas Survival Guide – Part Two

I have vowed to make Christmas 2014 stress free.  I have vowed to bring joy back into Christmas and prolong my life!  So I have devised a Christmas Survival Plan using all the best features of the online world. In Part One, I detailed the best digital hacks for making your lists, buying presents online and pumping out Christmas cards and party invitations, s
Publish At:2014-12-15 18:40 | Read:28446 | Comments:0 | Tags:Consumer Family Safety Identity Protection credit card fraud

The (Digital) Christmas Survival Guide – Part One

This year Christmas is going to be different.  I am officially pledging to take the stress out of the silly season.  I am vowing to avoid highly strung crowds in Westfield Shopping Centres, to not partake in exhausting ‘all-nighters’ frantically writing Christmas cards, to ‘say no’ to last minute present stress and to absolutely not get involved in last minu
Publish At:2014-12-10 17:10 | Read:7131 | Comments:0 | Tags:Consumer Family Safety Identity Protection credit card fraud

What is Pharming?

I was surfing on YouTube the other day and found this hilarious video mash-up of Taylor Swift’s song “Shake It Off” and an 80s aerobics video. For a lot of kids today, mash-ups are all the rage—whether it’s combining two videos, two songs, or two words. Mash-ups have even caught on in the tech world. The word pharming is actually a mash-up of the words phish
Publish At:2014-12-08 11:10 | Read:4220 | Comments:0 | Tags:Consumer Identity Protection computer security cybercrime id

Youth & Social Media

The digital world is here to stay. The youth are growing up with and making internet technologies, such as social networking sites, an integral part of their lives. They want to know; share and be heard. They can connect with people who appeal to them; share views and photos instantly; sound out ideas in public; give vent to their emotions; and MOST importan
Publish At:2014-12-03 23:10 | Read:4739 | Comments:0 | Tags:Consumer Family Safety Identity Protection cyberbullying ide

7 Things You Can Do To Protect Your Identity

One of my favorite commercials is a guy working out with his personal trainer. The trainer asks him if he’s been eating his vegetables every day. When he replies, “When I can,” the trainer bops him on the head. He could have had a V8! Just like the man thought that eating his daily vegetables would be hard, sometimes protecting your identity seems like a cho
Publish At:2014-12-01 17:05 | Read:4518 | Comments:0 | Tags:Consumer Identity Protection computer security identity thef

Tools

Tag Cloud