HackDig : Dig high-quality web security articles for hacker

Connected Medicine and Its Diagnosis

Medical data is slowly but surely migrating from paper mediums to the digital infrastructure of medical institutions. Today, the data is “scattered” across databases, portals, medical equipment, etc. In some cases, the security of the network infrastructure of such organizations is neglected, and resources that process medical information are acc
Publish At:2017-09-13 08:00 | Read:117 | Comments:0 | Tags:Featured Publications infrastructure Internet of Things Secu

Big Changes Around the Corner for the IoT

The Internet of Things (IoT) is a swamp that just doesn’t want to be drained. While there hasn’t been a huge alligator of a distributed denial-of-service (DDoS) attack in the last few months, it’s only a matter of time before a new one strikes. There are simply too many connected devices, many of which lack the built-in security to resist b
Publish At:2017-04-21 16:20 | Read:679 | Comments:0 | Tags:Endpoint Network Connected Devices Infrastructure Infrastruc

The Mistakes of Smart Medicine

As numerous studies have shown, smart houses, smart cars, and smart cities are undeniably beneficial to people in everyday life, but quite often can become a threat to their safety. It is not only a matter of personal data leakage. Just imagine that, for example, a smart refrigerator, affected by a third party at one point or another, would begin identifying
Publish At:2017-03-30 14:35 | Read:628 | Comments:0 | Tags:Analysis Featured Publications infrastructure Internet of Th

Lesson Learned From Stuxnet

Security researchers discovered Stuxnet in 2010, and it has since become one of the most well-known malware campaigns in history. The cybercriminals behind the attack developed the infamous worm to damage programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems using four zero-day vulnerabilities in Microsoft Windows
Publish At:2017-03-10 12:10 | Read:640 | Comments:0 | Tags:Energy and Utility Infrastructure Protection Energy Industry

How to Ensure the Success of a Hot Desking Strategy

The concept of hot desking — the practice of working in a shared office with unassigned desks — has been around for at least a decade. While much has been written about it from a worker’s point of view, employers and IT administrators have had a relatively small voice in the discussion around the latest office craze. Before you even consider whether th
Publish At:2017-01-13 22:00 | Read:1080 | Comments:0 | Tags:Infrastructure Protection Mobile Security Bring-Your-Own-Dev

Paas and continuos integration

Today I want to repost a great article first posted on sysadvent blog. I think it’s a great post that show how to integrate different software to achieve a modern continuos integration. Original article by: Written by: Paul Czarkowski (@pczarkowski) Edited by: Dan Phrawzty (@phrawzty) Docker and the ecosystem around it have done some great things for d
Publish At:2016-11-19 20:55 | Read:1468 | Comments:0 | Tags:Articles Guides alias continuos integration ghost infrastruc

ICS vulnerabilities are still rampant

To put it in somewhat technical terms, the nation’s industrial control systems (ICS) – part of its critical infrastructure – are not only vulnerable to compromise, they are likely compromised right now.Or, in Paul Dant’s much more blunt, and less technical terms, “your sh-- is f--ked.”Dant, chief strategist and managing principal at Independent Security
Publish At:2016-09-24 03:05 | Read:810 | Comments:0 | Tags:Security Internet of Things Infrastructure Cybersecurity

Bank of England wants next payment system to be blockchain-ready

The Bank of England wants to open its interbank settlement service to blockchain technologies as part of a major revamp of the system.The bank is not suggesting that U.K. banks should begin processing bitcoin payments as a matter of routine. However, it does want the replacement for its ageing real-time gross settlement (RTGS) system to be ready for what
Publish At:2016-09-16 12:15 | Read:633 | Comments:0 | Tags:Financial Services IT Infrastructure Security

Citrix & LogMeIn complete complicated, tax-free sort-of merger

LogMeIn, the makers of the popular remote desktop software as well as IT security and conferencing offerings, will become part of a Citrix subsidiary in the wake of a complicated, $1.8 billion transaction announced Tuesday by the two companies.The transaction is what’s called a Reverse Morris Trust, which apparently allows the untaxed transfer of
Publish At:2016-07-28 06:00 | Read:903 | Comments:0 | Tags:Infrastructure Security Careers/Staffing Internet of Things

How to trick traffic sensors

A detailed presentation of this research was delivered at RSA US 2016, and is available at https://www.rsaconference.com/writable/presentations/file_upload/tech-t09-smart-megalopolises.-how-safe-and-reliable-is-your-data.pdf In the past two years traffic sensors have mushroomed in Russian cities. Drivers using speed camera detectors were the first to spot th
Publish At:2016-04-18 10:05 | Read:959 | Comments:0 | Tags:Blog Featured Research infrastructure Internet of Things Sma

VMware, Cisco SDNs bring home the bacon

In the scramble for SDN supremacy, Cisco and VMware usually bark about users who opt for one of their solutions over the other.In all the noise, it’s rare to hear from one that plans to implement both.But that’s what SugarCreek, a $650 million, privately-held food processing and packing company based in Washington Court House, OH, is doing in its softwar
Publish At:2016-01-28 11:45 | Read:740 | Comments:0 | Tags:Data Center Cloud Computing Software-Defined Networking Infr

Why Aging Infrastructure Is a Growing Problem

Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software.However, as we relate in the
Publish At:2016-01-21 20:55 | Read:814 | Comments:0 | Tags:Security 2016 Annual Security Report 2016 ASR infrastructure

What Are the Risks of Legacy Infrastructure?

The vast majority of organizations rely on computing systems to run their operations, but for many, those networks have been built up over a number of years. As a result, many organizations find themselves relying on legacy infrastructure. Maintaining legacy systems can be costly. A recent report by the U.S. Government Accountability Office (GAO) found that
Publish At:2015-11-24 22:15 | Read:877 | Comments:0 | Tags:Infrastructure Protection Cloud Cloud Computing Critical Inf

Report: Microsoft paying $320 million for cloud security provider Adallom

Microsoft is said to be paying $320 million to acquire Adallom, a cloud security provider whose services might help Microsoft in its new push toward becoming a “cloud-first” company.Adallom provides back-end security tools that gather usage data and detect suspicious activity. Its services are used by Netflix, SAP and Hewlett-Packard, according to the compan
Publish At:2015-07-20 19:40 | Read:955 | Comments:0 | Tags:Security Cloud Computing Infrastructure Leadership and Manag

The Upload: Your tech news briefing for Tuesday, June 23

Privacy group wants Uber probed for data collectionThe Electronic Privacy Information Center has complained to the U.S. Federal Trade Commission about Uber’s new data collection policy: it comes into effect next month and allows the company to access a customer’s location even when the smartphone app is not actively in use, and to access the information from
Publish At:2015-06-23 13:35 | Read:790 | Comments:0 | Tags:Internet Networking Cloud Computing Infrastructure IT Manage

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud