HackDig : Dig high-quality web security articles for hacker

Apple removed iOS VPN apps from Chinese App Store in compliance to censorship law

In compliance with Chinese Internet monitoring law, Apple has started removing all IOS VPN apps from it App Store in China. The company complies with a request from the Chinese Government that wants to strict censorship making it harder for netizens to bypass the Great Firewall system (aka Golden Shield project). The Golden Shield project allows China to c
Publish At:2017-07-30 11:50 | Read:223 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations Apple Censorsh

The UK continues to grant the export of surveillance equipment to countries like Turkey

According to the UK’s Department for International Trade, the country granted a license to export surveillance equipment to Turkey earlier this year. The UK continues to be one of the most active countries involved in the trade of surveillance technology. British firms continue to export surveillance systems ranging from internet mass surveillance equ
Publish At:2017-07-24 18:32 | Read:200 | Comments:0 | Tags:Breaking News Digital ID Intelligence Laws and regulations C

Russia’s Duma has approved the bill to prohibit tools used to surf outlawed websites

Russia is going to tighten controls on web services, on Friday, the parliament voted to prohibit web tools that could be used to surf outlawed websites. Recently Russian authorities threatened to ban to ban Telegram because it refused to comply data protection laws. On Friday, the Russia’s parliament voted to ban web tools that could be used by people
Publish At:2017-07-22 11:15 | Read:276 | Comments:0 | Tags:Breaking News Laws and regulations

Telegram agrees to register in Russia, but it will not share private data

Telegram agrees to register with Russia authorities to avoid the local ban, but the battle is still ongoing because it won’t share user data. The Russian Government threatened to ban Telegram because it refused to comply data protection laws. “There is one demand, and it is simple: to fill in a form with information on the company that controls T
Publish At:2017-07-03 06:30 | Read:235 | Comments:0 | Tags:Breaking News Digital ID Hacking Laws and regulations ISIS p

FBI hacked a US Darknet shopper who tried to purchase Mail Bomb

The FBI hacked the system of a dark web user who tried to purchase a mail bomb from an undercover investigator in the US. According to a plea agreement, filed on April 28, 2017, Clinton Scott Bass of Georgia (US) tried in a first time to purchase a car bomb. The man, who was using two different pseudo names, contacted an undercover FBI agent on a darknet mar
Publish At:2017-07-02 12:06 | Read:396 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Laws and regulati

Anthem agreed to pay $115m to settle a class-action suit brought on by the 2015 data breach

Anthem, the largest US healthcare insurance company, has agreed to pay $115m to settle a class-action suit brought on by the 2015 data breach. Anthem, the largest US healthcare insurance company, has agreed to pay $115m to settle a class-action suit brought on by the 2015 data breach. The attack on Anthem exposed 78.8 million records and according to experts
Publish At:2017-06-27 21:35 | Read:274 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Laws and regulations A

Hacker pleaded guilty to stealing satellite data from US DoD

The British hacker Sean Caffrey, 25, from Sutton Coldfield pleaded guilty to stealing satellite data from US Department of Defense (DoD). The British hacker Sean Caffrey, 25, from Sutton Coldfield pleaded guilty to stealing user accounts from a U.S. military communications system. According to the NCA, the man admitted in the Birmingham Crown Court to steali
Publish At:2017-06-17 22:10 | Read:443 | Comments:0 | Tags:Breaking News Data Breach Hacking Laws and regulations data

The Active Cyber Defense Certainty Act Makes Hacking Back Anything But “Certain”

Is the hack back legal? There is a heated debate about the concept of active defense. What about the Active Cyber Defense Certainty (ACDC) Act? In a time where attribution of cyber crimes is all but impossible, the idea of allowing companies to ‘hack back‘ at their attackers seems far-fetched. However, Tom Graves (R-GA) has introduced an amen
Publish At:2017-06-06 09:55 | Read:427 | Comments:0 | Tags:Breaking News Laws and regulations Security Active Cyber Def

Theresa May says ‘enough is enough’ after the London Bridge terror attack

Commenting the London Bridge terror attack, Prime Minister says there is ‘far too much tolerance of extremism’ in the UK and urges Internet regulation. The London Bridge terror attack is fueling the debate about the Internet regulation, the Prime Minister Theresa May believe the terrorists had ‘safe spaces’ online and this is no more acceptable.
Publish At:2017-06-04 20:45 | Read:561 | Comments:0 | Tags:Breaking News Laws and regulations Security Terrorism encryp

With Less Than 1 Year To Go Companies Place Different Priorities on GDPR Compliance

The European General Data Protection Regulation (GDPR) will take effect in one year from now, but a large number of firms are far from prepared. It feels like Y2K all over again. We are less than one year until the impact of the GDPR is realized, no one is certain what will happen, and everyone is taking a different approach to mitigation. In April 2016,
Publish At:2017-05-30 05:10 | Read:541 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations GDPR Law priva

Austrian parties SPÖ and ÖVP want Whatsapp monitoring

Austrian SPÖ and ÖVP parties are fighting for WhatsApp instant messaging and plan further measures to fight the terrorism. Both the Austrian Social Democratic Party of Austria (SPÖ) and the Austrian People’s Party (Österreichische Volkspartei; ÖVP) are fighting for instant messaging monitoring such as WhatsApp. The experts believe that the Government w
Publish At:2017-05-29 10:45 | Read:320 | Comments:0 | Tags:Breaking News Hacking Intelligence Laws and regulations Terr

UK Government’s secret programme for mass surveillance on internet and phones leaked

According to a draft document leaked online, UK Government is assigning itself more powers to spy on live communications and use malware for surveillance. While the NSA is announcing it will stop surveillance activities on emails, texts, and other internet communications, the UK government has secretly drawn up more details of its new bulk surveillance power
Publish At:2017-05-07 10:15 | Read:501 | Comments:0 | Tags:Breaking News Digital ID Intelligence Laws and regulations e

Introduction to the NIST CyberSecurity Framewor for a Landscape of Cyber Menaces

The implementation of the NIST CyberSecurity Framework is of vital importance for the changes taking place in the landscape of zero-day threats The NIST CyberSecurity Framework is a guide for businesses and enterprises of good practices for information security. The NIST CyberSecurity Framework proposes a guide, which can adapt to each enterprise e for diffe
Publish At:2017-04-20 04:35 | Read:492 | Comments:0 | Tags:Breaking News Laws and regulations Security

Microsoft biannual transparency report – US foreign intelligence surveillance requests more than doubled

Microsoft published the biannual transparency report – The number of US foreign intelligence surveillance requests more than doubled. Microsoft shared data included in the biannual transparency report, the IT giant received more than double what the company said it received under the Foreign Intelligence Surveillance Act (FISA) during the preceding six
Publish At:2017-04-17 21:20 | Read:256 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations Reports biannu

President Donald Trump is going to extend by one year the Executive Order 13694

US President Trump is extending by one year special powers introduced by President Obama with the Executive Order 13694 on cyber security. The US President Donald Trump intends to extend by one year the Executive Order 13694 that gives the US Governments special powers to issue sanctions against people and organizations engaged in significant cyberattacks an
Publish At:2017-03-30 16:00 | Read:424 | Comments:0 | Tags:Breaking News Cyber warfare Laws and regulations Executive O

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud