HackDig : Dig high-quality web security articles for hackers

INTERNET BLOCKING IN MYANMAR – SECRET BLOCK LIST AND NO MEANS TO APPEAL

The list of sites blocked in MYANMAR includes many websites that did not fall under the categories adult content or fake news Original post at: https://www.qurium.org/alerts/myanmar/internet-blocking-in-myanmar-secret-block-list-and-no-means-to-appeal In March 2020, The Ministry of Telecommunications (MoTC) issued a directive to all operators
Publish At:2020-08-10 06:18 | Read:228 | Comments:0 | Tags:Breaking News Digital ID Censorship Hacking hacking news inf

The tech challenges brought by COVID-19

The panic around the novel coronavirus (COVID-19) continues to result in disruptions rarely seen before in human history. The forefront challenges caused by the virus are certainly with economic and health flavor. However, the millions of people losing their jobs and the tens of thousands of people already killed by the virus are only one part of the problem
Publish At:2020-04-13 05:09 | Read:1291 | Comments:0 | Tags:Mobile News Security Technology coronavirus covid19 Internet

Massive DDoS attack brought down 25% Iranian Internet connectivity

Iran comes under cyber-attack again, a massive offensive brought down a large portion of the Iranian access to the Internet. Iran infrastructures are under attack, a massive cyberattack brought down a large portion of the Iranian access to the Internet, according to the experts the national connectivity fell to 75%. The NetBlocks internet observatory
Publish At:2020-02-09 16:26 | Read:1062 | Comments:0 | Tags:Breaking News Security DDoS hacking news information securit

Sir Tim Berners-Lee publishes plan to save the web from ‘digital dystopia’

byJohn E DunnWeb inventor Sir Tim Berners-Lee is so worried his 30-year-old creation is turning into a “digital dystopia” that he’s proposed a Contract for the Web to rescue it from a headlong plunge into a moral abyss.It’s not an original worry – Berners-Lee has publicly fretted about the web’s direction many times in recent years – and it’s not
Publish At:2019-11-26 12:35 | Read:1254 | Comments:0 | Tags:Facebook Google Microsoft Privacy Twitter Contract for the W

IoT bills and guidelines: a global response

You may not have noticed, but Internet of Things (IoT) rules and regulations are coming whether manufacturers want them or not. From experience, drafting up laws which are (hopefully) sensible and have some relevance to problems raised by current technology is a time-consuming, frustrating process. However, it’s not that long since we saw IoT devices go main
Publish At:2019-11-22 16:50 | Read:1239 | Comments:0 | Tags:IoT Privacy Australia California internet Internet of Things

As Internet turns 50, more risks and possibilities emerge

This op-ed originally appeared in the San Francisco Chronicle on October 28, 2019. We occupy a richly-connected world. On the Internet, we collapse distance and shift time. But this Internet that delivers mail, connects us with friends, lets us work anywhere, and shop from the palm of the hand, is a mere 50 years old, slightly younger than Jennifer Anisto
Publish At:2019-11-11 23:20 | Read:853 | Comments:0 | Tags:Awareness arpanet dns domain domains history of the internet

A week in security (October 28 – November 3)

Last week on Malwarebytes Labs, we celebrated the birth of the Internet 50 years ago, highlighted reports about the US Federal Trade Commission (FTC) filing a case against stalkerware developer Retina-X, issued a PSI on disaster donation scams, looked at the top cybersecurity challenged SMBs face, and provided guidance to journalists on how they can defend t
Publish At:2019-11-11 23:20 | Read:1411 | Comments:0 | Tags:A week in security Adobe Creative Cloud advanced persistent

Rapid7 report millions of endpoints exposed via SMB, Telnet Ports

A study conducted by the security firm Rapid7 revealed that millions of devices remain exposed to cyber attacks via  SMB, Telnet, RDP, and other types of improper configurations. Rapid7 published the second report National Exposure Index that provides Internet service providers (ISPs) worldwide information about the global exposure of devices. The researche
Publish At:2017-06-16 09:20 | Read:6062 | Comments:0 | Tags:Breaking News Hacking Internet of Things Reports botnet Inte

Goodbye Privacy? The US Has Recently Passed a Bill That Has Everyone Worried

 The US Congress  decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news. Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, however, required these companies to obtain permission fr
Publish At:2017-05-26 18:50 | Read:5247 | Comments:0 | Tags:Security companies data Internet Privacy

The Deep Web: Myths And Truths You Need To Know

Every now and then the media comes up with a sensational story about the Deep Web. Often these tales are shocking and frightening – but are they true? What is the Dark Web and Deep Web? Before going further, we need to understand what the Deep Web actually is – fortunately the concept is much easier than you might think. Any web page that you can locate from
Publish At:2017-04-27 12:00 | Read:3568 | Comments:0 | Tags:Mobile News News dark web deep web Internet tor

Amazon S3 outage. Increased error rates. Amazon AWS is down

An Amazon AWS S3 outage is causing serious problems for a huge number of websites, applications, and Internet of Things devices. The Amazon S3 web-based storage service is experiencing serious widespread issues. Web services and mobile apps leveraging on Amazon S3 suffered a significant outage. According to the company, the Amazon S3 outage was caused by “hi
Publish At:2017-03-01 01:10 | Read:5255 | Comments:0 | Tags:Breaking News Security Amazon S3 outage cloud computing Inte

The Internet Isn’t Vulnerable – It’s a Weapon

In the United States, there is a basic rule of thumb that at some point after a block of metal undergoes a certain amount of manufacturing, it becomes a rifle. When approximately 80 percent of the manufacturing is complete, the metal is not a weapon; at 81 percent, it is.A weapon is dangerous; it is often regulated, and more often than not, it has safety sta
Publish At:2017-02-02 01:45 | Read:5582 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Internet I

Security and Technology Literacy Go Hand in Hand

‘Twas just the season when millions of unsuspecting consumers unwittingly courted disaster by gorging their digital appetites on gadgets, gizmos, and whiz bangs that delight kids of all ages with their digital magic.Which is the point of this nearly bah-humbug introduction. Because Arthur C. Clarke was right when he formulated his three laws, the best
Publish At:2017-01-05 03:16 | Read:5015 | Comments:0 | Tags:Featured Articles Internet of Things insider threat Internet

What is a VPN and how it Works?

Watch your favorite shows anywhere, and other useful VPN functions In simple terms, a VPN, or Virtual Private Network, is a connection between a group of discrete networks that exchanges encrypted data between your computer and a distant server. Sounds like boring technical jargon? Well, VPN’s can actually be used to perform some pretty neat tricks online t
Publish At:2016-12-08 01:30 | Read:4579 | Comments:0 | Tags:Internet Security Mobile News Internet VPN

Be careful not to keep your invoices where your competitors can find them

One of the most common and most sensitive documents that companies handle on a daily basis is invoices. Issuing and receiving them is a fundamental activity for every business, however, people are not always aware of how important they are even after being paid or collected. Together or individually, they can expose critical information that can be very val
Publish At:2016-11-21 22:40 | Read:4194 | Comments:0 | Tags:News companies cybersecurity Internet invoices

Tools

Tag Cloud