HackDig : Dig high-quality web security articles for hacker

DNA virus brings malware full circle

In what sounds like a science fiction story, scientists have successfully infected a computer using a virus encoded in DNA. The experiment was designed to prove that DNA could be used to successfully infect computers in the future. During the test, engineers created an artificial strand of DNA and “programmed” malicious code inside it. The strand was then in
Publish At:2017-09-29 04:10 | Read:159 | Comments:0 | Tags:Malware Mobile News Antivirus cybersecurity Virus

Bionic employees and biohacking

Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work. But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Publish At:2017-09-26 20:45 | Read:337 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Locky ransomware strikes at Amazon

Locky is back! We’ve been closely monitoring the rebirth of the ransomware for quite some time. Since early last year, different variations of the ransomware have been periodically popping in and out. Last year we discussed the tricks of the malicious software and had a deeper look into how it works. As you may remember, the primary purpose of the malicious
Publish At:2017-09-22 06:05 | Read:266 | Comments:0 | Tags:Malware Mobile News cybersecurity Ransomware

Artificial Intelligence: Myth and Reality

As Artificial Intelligence (AI) begins to find practical applications in day-to-day life, we are hearing more and more about it. In amongst the success stories are countless warnings of a Terminator-like future where self-aware robots take over the world. So how can you separate fact from fiction, and could humanity really be eradicated by intelligent comput
Publish At:2017-09-19 22:50 | Read:186 | Comments:0 | Tags:Mobile News Technology artificial intelligence technology

BlueBorne Bluetooth hack could affect millions of smartphones

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time. But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use
Publish At:2017-09-15 08:00 | Read:260 | Comments:0 | Tags:Mobile News Mobile Security Android Hackers Malware

GDPR offers new protections for young adults

From May 2018, a new data protection law – the General Data Protection Regulation (GDPR) – will come into force, designed to better protect the privacy of European citizens. GDPR gives consumers a number of rights over the personal data that companies collect, and forces those businesses to better protect the information too. If a company does breach the GDP
Publish At:2017-09-14 13:35 | Read:344 | Comments:0 | Tags:Family Safety Mobile News gdpr Privacy

Why is Online Voting Not a Good Idea?

Online voting could introduce great risk into the election system by threatening voters It’s the 21st century, and we are living in the future as technology is advancing at a rapid speed. It has never been easier to shop online and to do online banking. It is possible money will even cease to exist as blockchain digital currencies such as Bitcoin and Monero
Publish At:2017-09-12 06:15 | Read:348 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Equifax hit with a data breach possibly affecting half of the US population

This Thursday Equifax, one of the three major credit bureaus in the US, announced that cyber security incident involving consumer information of nearly half of the population in the US had been spotted on July 29th, 2017. In the press release published yesterday, they stated that based on their internal investigation the data breach began taking place in mid
Publish At:2017-09-08 05:50 | Read:268 | Comments:0 | Tags:Mobile News News companies cybersecurity urgent

Cyber Security Tips for Parents and Children

How to protect your children from cyber threats The summer just gracefully glanced over our lives, and now it is time for things to get back to normal – we will soon start feeling the cold breeze and the days will become shorter. Even though that the good old days of casual dress code in the office are now gone, being back to reality has some positives too.
Publish At:2017-09-05 17:15 | Read:387 | Comments:0 | Tags:Mobile News Tips cybersecurity passwords Privacy

Facebook Messenger: Beware of malware!

New cross-platform malware for Windows/Mac/Linux spreading via Facebook Messenger A cyber-criminal gang is using Facebook Messenger to spread a new malware specimen through links to spoof websites. This threat, which is highly sophisticated and has been customized for each Web browser, has been uncovered by a security expert who received a suspicious message
Publish At:2017-08-31 07:00 | Read:213 | Comments:0 | Tags:Mobile News News Facebook Malware

Are All Hackers Bad? 7 Types of Hackers

Top Seven Types of Hackers You hear about leaks and hacks on a daily basis, but most of the times the identity of the people involved in these events remain hidden from the society. Every time there is a cyber-incident, the media releases a lot of information about the damages, but you rarely get much about the hackers themselves. Sometimes names of a myster
Publish At:2017-08-30 12:35 | Read:534 | Comments:0 | Tags:Mobile News News Security Hackers Malware tips

Oreo and the sweet history of Android versions

Oreo Android, the sweetest version? What does an Oreo cookie, a donut, a marshmallow or a lollipop have to do with your smartphone? Well, believe it or not, the names of all those sweets indicate the Android operating system installed on your cell phone. After months of speculation about the new features to be included in the new Android operating system, Au
Publish At:2017-08-29 02:40 | Read:398 | Comments:0 | Tags:Mobile News Mobile Security Technology Android smartphones

PlayStation Network Hacked. Again.

When mysterious tweets appeared on the official Sony PlayStation Twitter feed on Monday morning, it quickly became clear that the account had been hacked. Indeed, the hackers made little effort to hide their activities, proudly announcing that the breach had been carried out by the OurMine Security Group. Photo credit: Twitter Initially there were a few twee
Publish At:2017-08-23 14:50 | Read:383 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

Boarding Passes May Soon Be Part of the Past with Biometric

Are the Biometric security sistem safe? Back in June, the Department of Homeland Security (DHS) released a privacy impact assessment update for the Traveler Verification Service (TVS). The update is aimed at international travelers and reveals further developments and expanding on the biometric entry-exit airport system throughout the US. Intended to improve
Publish At:2017-08-22 01:55 | Read:283 | Comments:0 | Tags:Mobile News Technology cybersecurity

Hackers target energy and utility firms

Why cyber warfare is becoming so important In the early stages of any war, the first action is to try and disrupt the infrastructure of an enemy. In recent years, this means risking people’s lives to bomb key infrastructure, like power plants, bridges and fuel depots. With key utilities crippled, society quickly breaks down, making it very hard for the count
Publish At:2017-08-18 05:50 | Read:252 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud