HackDig : Dig high-quality web security articles for hacker

Attention YouTubers: Protect Your Account From Being Hacked

Did you know that YouTube has 23 million content creators worldwide? Well, it turns out that many of these video gurus found themselves in the middle of a cybersecurity calamity this past weekend. According to Forbes, reporter Catalin Cimpanua discovered a massive spear phishing campaign targeting YouTube content creators, tricking them into giving up their
Publish At:2019-09-25 23:20 | Read:246 | Comments:0 | Tags:Consumer Threat Notices cybersecurity internet security Phis

Ellen DeGeneres Instagram Hack: What You Can Do to Protect Your Account

Today was not an easy morning for Ellen DeGeneres. She woke to find that her Instagram account was briefly hacked according to the talk show host’s Twitter and Yahoo Entertainment. A series of giveaways offering free Tesla cars, MacBooks, and more, were posted to the talk show host’s account last night. After seeing the posts, some of her followers became sk
Publish At:2019-09-19 23:20 | Read:188 | Comments:0 | Tags:Consumer Consumer Threat Notices cybersecurity internet secu

How to Spring Clean Your Digital Life

With winter almost gone, now is the perfect time to start planning your annual spring clean. When we think about our yearly sort out, most of us think about decluttering our chaotic linen cupboards or the wardrobes that we can’t close. But if you want to minimise the opportunities for a hacker to get their hands on your private online information then a clea
Publish At:2019-09-19 23:20 | Read:215 | Comments:0 | Tags:Consumer Family Safety cybercrime cybersafety data protectio

14 Million Customers Affected By Hostinger Breach: How to Secure Your Data

Whether you’re a small business owner or a blogger, having an accessible website is a must. That’s why many users look to web hosting companies so they can store the files necessary for their websites to function properly. One such company is Hostinger. This popular web, cloud, and virtual private server hosting provider and domain registrar boasts over 29 m
Publish At:2019-09-19 23:20 | Read:185 | Comments:0 | Tags:Consumer Threat Notices cybersecurity Data Breach data prote

How To Practise Good Social Media Hygiene

Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s largest dedicated cybersecurity firm, McAfee, has revealed that two thirds (67%) of Aussies are embarrassed by the content that appears on their social media profiles. Yikes! And just to make the picture even more complicated, 34% of Aussies adm
Publish At:2019-09-19 23:20 | Read:198 | Comments:0 | Tags:Consumer Identity Protection credit card fraud cybercrime da

What is Net Neutrality and How to Voice Your Opinion?

What happens when cable and phone companies are left to their own devices? Federal Communications Commission (FCC) will soon stop accepting comments on Net Neutrality. There has been a lot of confusion amongst people who are either not technology savvy or not familiar enough with the ongoing debate. We spent years following the conversation and researching t
Publish At:2017-08-28 05:20 | Read:3873 | Comments:0 | Tags:Mobile Security News Security Communications Internet Securi

Internet for everyone with Facebook’s drone Aquila

Last month Facebook announced the second successful test of Aquila – a giant sun powered drone. Even though the technology is still in the makes and has a long way to go, Mark Zuckerberg has been very serious about connecting the world– Facebook recently surpassed the 2 billion users mark.  There is an opportunity for Facebook to continue its path of success
Publish At:2017-07-21 07:50 | Read:3024 | Comments:0 | Tags:Technology drone Facebook Internet Security

Don’t Let Yahoo Happen To You: How to Protect Your Business from Large-Scale Data Theft

In 2016, the theft of passwords from internet titans is no longer an exception. Just when it seemed like the year was winding down, having left us with the surprising news of what until yesterday was considered the highest magnitude cyberattack in history suffered by Yahoo and reported three months ago, this same company returns to headlines after announcin
Publish At:2016-12-15 18:25 | Read:4191 | Comments:0 | Tags:Internet Security Mobile News businesses highlighted Product

What is a VPN and how it Works?

Watch your favorite shows anywhere, and other useful VPN functions In simple terms, a VPN, or Virtual Private Network, is a connection between a group of discrete networks that exchanges encrypted data between your computer and a distant server. Sounds like boring technical jargon? Well, VPN’s can actually be used to perform some pretty neat tricks online t
Publish At:2016-12-08 01:30 | Read:3405 | Comments:0 | Tags:Internet Security Mobile News Internet VPN

This palm-sized device will supersize your security.

Wouldn’t you like to get your hands on a tough little device that will boost your business’s security? Meet ORWL, a circular computer device that is engineered to top-off your computer’s security. A great number of companies have been victims of data leaks because of an insider or cybercriminal who had physical access to their computers or devices. Once a cy
Publish At:2016-10-18 10:35 | Read:3071 | Comments:0 | Tags:Internet Security News businesses cybersecurity

This is why you should “tether” your work phone

The tablets or smartphones at your office connect to either 3G or 4G (which is better than WiFi). When tablets and other connected devices (like smartphones or smartwatches) become essential to an employee’s work, then it is essential these employees are properly trained on using them safely. Surely, workers think that connecting an office device to their d
Publish At:2016-10-06 23:45 | Read:2263 | Comments:0 | Tags:Internet Security businesses cybersecurity mobile devices

Got something to hide? Don’t pixelate it.

Many businesses share documents that are pixelated in order to protect private information, whether they be bank account numbers, photographs or other private information. Although pixelation used to be a simple and sufficient way to hide confidential information, now computers are smart enough to read these distorted images—even when your eye cannot. Pixel
Publish At:2016-10-04 16:55 | Read:2532 | Comments:0 | Tags:Internet Security businesses news

How the new EU cybersecurity regulations affect businesses

The 28 countries that form the European Union will have a common cybersecurity goal beginning July 6th. The European parliament has approved a new directive in which these countries will have to change their legislation in the next 21 months. The sectors that are listed (energy, transport, banking) will have to guarantee that they are capable of preventing
Publish At:2016-07-19 18:40 | Read:2607 | Comments:0 | Tags:Internet Security cybersecurity EU Panda Security

Reselling Business and Home User Information

It is important to protect businesses against threats that lurk in the cyberworld. The threats may seem innocent at first, but usually, those are the ones that cause the most damage. Reselling your hard drive, for example, may seem like a simple task, but it could actually open the door for cyber delinquents. A recent investigation found that, out of 200 har
Publish At:2016-07-12 21:55 | Read:2855 | Comments:0 | Tags:Internet Security businesses Panda Security tips

Social Media, Ranked as One of the Top Threats Aimed at Companies

Long ago, the term “goods” referred to necessities like wheat, milk, sugar, and petroleum, but our necessities have changed.  Now “goods” can refer to broad band or smartphones or computers or–cybercrime? As seen in the RSA’s report about the Current State of Cybercrime, experts confirm what we already know: malware and t
Publish At:2016-07-11 09:25 | Read:2623 | Comments:0 | Tags:Internet Security Antivirus businesses Panda Security social


Share high-quality web security related articles with you:)


Tag Cloud