HackDig : Dig high-quality web security articles for hacker

The Living Dead: How to Protect Legacy Systems

The recent widespread attacks of WannaCry and NotPetya both used known vulnerabilities of legacy operating systems, namely SMB v1 protocol. In general, known vulnerabilities are easy to mitigate as long as patches and updates are provided. But in these cases, many organizations seem to have ignored the advice to patch their systems — or maybe not. There ar
Publish At:2017-07-20 21:00 | Read:519 | Comments:0 | Tags:Network Risk Management Legacy Applications legacy systems n

What Are the Risks of Legacy Infrastructure?

The vast majority of organizations rely on computing systems to run their operations, but for many, those networks have been built up over a number of years. As a result, many organizations find themselves relying on legacy infrastructure. Maintaining legacy systems can be costly. A recent report by the U.S. Government Accountability Office (GAO) found that
Publish At:2015-11-24 22:15 | Read:1061 | Comments:0 | Tags:Infrastructure Protection Cloud Cloud Computing Critical Inf

A SHA-1 Certificate Will Fail Soon

First published in 1995, SHA-1 is one of the cryptographic hash algorithms used to verify the certificates used by websites to prove that they are who they say they are. But it has a problem today: The assumptions made long ago as to its mathematical resistance to attacks have been overcome by cheaper, faster computing power. Now, a SHA-1 certificate just do
Publish At:2015-11-18 21:35 | Read:987 | Comments:0 | Tags:Application Security Software & App Vulnerabilities Certific


Share high-quality web security related articles with you:)


Tag Cloud