HackDig : Dig high-quality web security articles for hacker

One third of Americans’ cell numbers available on password-free server

Cell Numbers of one-third of the US population found on a password-free server Approximately 133 million US-based cell numbers are part of the 419 million records found by cyber-security researches on a password-free server. The private data is originating from Facebook. Most of the entries stored on the easily accessible server contained not only cell numbe
Publish At:2019-09-19 17:05 | Read:99 | Comments:0 | Tags:Mobile News News cybersecurity data breach news

How secure is the new iPhone 11?

Apple officially announced its latest series of mobile phones at an event in Silicon Valley. The new iPhone 11 series have already become available for preorder on Sept 13th and are expected to start shipping on the 20th. The new iPhone comes in three versions – 11, Pro and Pro Max. The significant difference between the three devices is the size, the
Publish At:2019-09-19 17:05 | Read:25 | Comments:0 | Tags:Mobile News News cybersecurity news technology

Internet scams – why do people keep falling for them?

The internet is a great way to stay informed about what is going on in the world around us. News, celebrity gossip, personal updates from friends, almost everything we want or need to know is available online – usually via social media. In between all the useful information is a lot of misinformation however. Hoaxes and scams continue to circulate onli
Publish At:2019-09-19 17:05 | Read:3 | Comments:0 | Tags:Mobile News Social Media cybersecurity Hoax scams

The Justice Department is suing Edward Snowden over a book

Edward Snowden, an American whistleblower who leaked highly classified information from the National Security Agency (NSA) and the CIA back in 2013, released a book called ‘Permanent Record’ on Sept 17th. The new book of the controversial American now living in exile in Russia got hit with a lawsuit only a few hours after it was published. Accord
Publish At:2019-09-19 17:05 | Read:68 | Comments:0 | Tags:Mobile News News privacy cybersecurity Edward Snowden law su

DNA virus brings malware full circle

In what sounds like a science fiction story, scientists have successfully infected a computer using a virus encoded in DNA. The experiment was designed to prove that DNA could be used to successfully infect computers in the future. During the test, engineers created an artificial strand of DNA and “programmed” malicious code inside it. The strand was then in
Publish At:2017-09-29 04:10 | Read:2376 | Comments:0 | Tags:Malware Mobile News Antivirus cybersecurity Virus

Bionic employees and biohacking

Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work. But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Publish At:2017-09-26 20:45 | Read:2873 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Locky ransomware strikes at Amazon

Locky is back! We’ve been closely monitoring the rebirth of the ransomware for quite some time. Since early last year, different variations of the ransomware have been periodically popping in and out. Last year we discussed the tricks of the malicious software and had a deeper look into how it works. As you may remember, the primary purpose of the malicious
Publish At:2017-09-22 06:05 | Read:2793 | Comments:0 | Tags:Malware Mobile News cybersecurity Ransomware

Artificial Intelligence: Myth and Reality

As Artificial Intelligence (AI) begins to find practical applications in day-to-day life, we are hearing more and more about it. In amongst the success stories are countless warnings of a Terminator-like future where self-aware robots take over the world. So how can you separate fact from fiction, and could humanity really be eradicated by intelligent comput
Publish At:2017-09-19 22:50 | Read:2491 | Comments:0 | Tags:Mobile News Technology artificial intelligence technology

BlueBorne Bluetooth hack could affect millions of smartphones

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time. But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use
Publish At:2017-09-15 08:00 | Read:3707 | Comments:0 | Tags:Mobile News Mobile Security Android Hackers Malware

GDPR offers new protections for young adults

From May 2018, a new data protection law – the General Data Protection Regulation (GDPR) – will come into force, designed to better protect the privacy of European citizens. GDPR gives consumers a number of rights over the personal data that companies collect, and forces those businesses to better protect the information too. If a company does breach the GDP
Publish At:2017-09-14 13:35 | Read:4109 | Comments:0 | Tags:Family Safety Mobile News gdpr Privacy

Why is Online Voting Not a Good Idea?

Online voting could introduce great risk into the election system by threatening voters It’s the 21st century, and we are living in the future as technology is advancing at a rapid speed. It has never been easier to shop online and to do online banking. It is possible money will even cease to exist as blockchain digital currencies such as Bitcoin and Monero
Publish At:2017-09-12 06:15 | Read:3247 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Equifax hit with a data breach possibly affecting half of the US population

This Thursday Equifax, one of the three major credit bureaus in the US, announced that cyber security incident involving consumer information of nearly half of the population in the US had been spotted on July 29th, 2017. In the press release published yesterday, they stated that based on their internal investigation the data breach began taking place in mid
Publish At:2017-09-08 05:50 | Read:2369 | Comments:0 | Tags:Mobile News News companies cybersecurity urgent

Cyber Security Tips for Parents and Children

How to protect your children from cyber threats The summer just gracefully glanced over our lives, and now it is time for things to get back to normal – we will soon start feeling the cold breeze and the days will become shorter. Even though that the good old days of casual dress code in the office are now gone, being back to reality has some positives too.
Publish At:2017-09-05 17:15 | Read:8205 | Comments:0 | Tags:Mobile News Tips cybersecurity passwords Privacy

Facebook Messenger: Beware of malware!

New cross-platform malware for Windows/Mac/Linux spreading via Facebook Messenger A cyber-criminal gang is using Facebook Messenger to spread a new malware specimen through links to spoof websites. This threat, which is highly sophisticated and has been customized for each Web browser, has been uncovered by a security expert who received a suspicious message
Publish At:2017-08-31 07:00 | Read:2944 | Comments:0 | Tags:Mobile News News Facebook Malware

Are All Hackers Bad? 7 Types of Hackers

Top Seven Types of Hackers You hear about leaks and hacks on a daily basis, but most of the times the identity of the people involved in these events remain hidden from the society. Every time there is a cyber-incident, the media releases a lot of information about the damages, but you rarely get much about the hackers themselves. Sometimes names of a myster
Publish At:2017-08-30 12:35 | Read:2899 | Comments:0 | Tags:Mobile News News Security Hackers Malware tips


Share high-quality web security related articles with you:)


Tag Cloud