HackDig : Dig high-quality web security articles for hacker

Protecting Legacy Applications from Attacks with Modern Hardware Isolation

Legacy applications are integral to most businesses and are heavily relied upon in the public sector Many legacy applications were written in a time when security was much less of a concern than today Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes Detection is obsolete and the future of cybersecurity d
Publish At:2017-09-11 10:00 | Read:1663 | Comments:0 | Tags:Company News detection Isolation legacy legacy apps Micro-VM

Disposable Computing is the Essence of Bromium’s Micro-Virtualization

We live in a disposable society, from our ever-present convenience foods in throw-away packaging to online speed-dating tailor-made for today’s low attention-span, instant gratification, swipe-left culture. Why be stuck with the same cruddy old PC filled up with accumulated digital gunk day after day, when you can have a squeaky-clean brand new computer eac
Publish At:2017-06-21 23:00 | Read:1455 | Comments:0 | Tags:Innovation computing disposable endpoints innovators kill-ch

Disposable Computing is the Answer to Cyber Security for Business

Disposability has become a regular thing in our lives; but you may have taken for granted the value it brings. Cost, convenience and risk are the cornerstones of successful disposability. Disposable computing offers a solution to cyber security and provides you with valuable threat information. This is the first in our two-part series on disposable computi
Publish At:2017-06-21 04:35 | Read:1623 | Comments:0 | Tags:Innovation computing convenience cost disposable end users I

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics
Publish At:2017-04-18 02:05 | Read:3137 | Comments:0 | Tags:Breaking News Threats anti-virus command control EDR Events

Breaking News: “It’s a Very Large-Scale Espionage Operation”

A complex cybercrime spy ring has been revealed today. A China-based cyber gang is behind the effort. Countries targeted include Japan, UK, France and the United States. If you’re responsible for your company’s cyber security, chances are, someone in your office has probably already forwarded this story to you. The Telegraph is sharing a story
Publish At:2017-04-05 08:55 | Read:3638 | Comments:0 | Tags:Breaking News Threats browsing China click crime email Malwa

Did You Have Ransomware Served to You Via Skype?

News breaking today that Skype users are being targeted by ransomware. Cybercriminals use Adobe Flash to get the job done. Bromium protects you from this kind of nonsense. It’s so hard to know when something can be trusted. And those of us who are just trying to get our jobs done using regular business tools are most often the target. I know: I am an
Publish At:2017-04-03 20:00 | Read:1568 | Comments:0 | Tags:Breaking News Beta browsing click confidence end user Malwar

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud