HackDig : Dig high-quality web security articles for hacker

Securing Medical Devices in the Age of the IoT

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches. S
Publish At:2017-11-06 09:40 | Read:168 | Comments:0 | Tags:Endpoint Health Care Mobile Security Connected Devices Feder

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducin
Publish At:2017-11-04 02:00 | Read:221 | Comments:0 | Tags:Mobile Security Apple Authentication Biometric Mobile Securi

Investigating IoT Crime in the Age of Connected Devices

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re
Publish At:2017-10-27 14:00 | Read:183 | Comments:0 | Tags:Fraud Protection Mobile Security Security Intelligence & Ana

Enterprise Mobility Management Even the Apprentice Can Control

Everyone else had already left for the day, but the Apprentice felt like his day was just beginning. He knew his internship with the IT department at Wizard, Inc. would be a challenge, but he never expected how challenging his final project — enterprise mobility management (EMM) — would be. The chief information officer (CIO) tasked him with securing all dev
Publish At:2017-10-23 17:50 | Read:176 | Comments:0 | Tags:Mobile Security Topics Enterprise Mobility Enterprise Mobili

Validating Machine Learning Detection of Mobile Malware

Zimperium’s core machine learning engine, z9, has a proven track record of detecting zero-day exploits. We recently announced an extension of the framework that detects previously unknown mobile malware. This extension is known as “z9 for Mobile Malware”, and was officially announced in September 2017. Internally, the code name has been “Cogito”, so this res
Publish At:2017-10-21 13:50 | Read:186 | Comments:0 | Tags:Android Mobile Malware Mobile security Mobile Threat Defense

Detecting KRACK Man in the Middle Attacks

What is KRACK? KRACK (Key Reinstallation attaCKs, KRACKs) is a serious weakness in the WPA2 protocol. WPA2 secures all modern protected Wi-Fi networks including those used by smartphones. Attackers within physical range of a Wi-Fi network can exploit protocol weaknesses by using key reinstallation attacks. The attack works against all modern protected Wi-Fi
Publish At:2017-10-21 13:50 | Read:182 | Comments:0 | Tags:Mobile security Mobile Threat Defense Threat Research KRACK

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

After the FBI issued a warning on internet-connected toys in July, researchers began digging into these devices to assess their functions as they relate to cybersecurity. But before describing what one of these toys can do, it might be helpful to explain how they work at a very high level. Typical Components of Internet-Connected Toys The first component of
Publish At:2017-09-18 17:25 | Read:282 | Comments:0 | Tags:Cloud Security Mobile Security Cloud Cloud Applications Conn

BlueBorne Bluetooth hack could affect millions of smartphones

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time. But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use
Publish At:2017-09-15 08:00 | Read:260 | Comments:0 | Tags:Mobile News Mobile Security Android Hackers Malware

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest
Publish At:2017-09-05 09:35 | Read:301 | Comments:0 | Tags:Data Protection Asset Management Compliance Data Security En

Oreo and the sweet history of Android versions

Oreo Android, the sweetest version? What does an Oreo cookie, a donut, a marshmallow or a lollipop have to do with your smartphone? Well, believe it or not, the names of all those sweets indicate the Android operating system installed on your cell phone. After months of speculation about the new features to be included in the new Android operating system, Au
Publish At:2017-08-29 02:40 | Read:398 | Comments:0 | Tags:Mobile News Mobile Security Technology Android smartphones

What is Net Neutrality and How to Voice Your Opinion?

What happens when cable and phone companies are left to their own devices? Federal Communications Commission (FCC) will soon stop accepting comments on Net Neutrality. There has been a lot of confusion amongst people who are either not technology savvy or not familiar enough with the ongoing debate. We spent years following the conversation and researching t
Publish At:2017-08-28 05:20 | Read:474 | Comments:0 | Tags:Mobile Security News Security Communications Internet Securi

Personal Electronic Devices Dodge TSA Ban — For Now

At least for the time being, business travelers will still be able to take their laptops and tablets along as carry-on luggage when they board a flight. That is the decision by the Transportation Safety Administration (TSA), which lifted its ban on air passengers carrying aboard personal electronic devices larger than a smartphone earlier this summer. The
Publish At:2017-08-25 11:15 | Read:430 | Comments:0 | Tags:Mobile Security Endpoint Security Mobile Devices Transportat

Facebook Telepathy Texting – Could It Be Hacked?

Is telepathy texting the next step in technology communications? With over 2 billion registered members, Facebook is the world’s most popular online service. But to maintain that title, Facebook is constantly developing new services to keep people logging in. In a recent video conference, Facebook chief Mark Zuckerberg discussed one of the cutting edge proje
Publish At:2017-08-25 06:35 | Read:390 | Comments:0 | Tags:Mobile Security News Social Media Facebook social media tech

iOS 11 in the Enterprise: Get Your iPads Ready

While some are in back-to-school mode and others are getting ready for football, we’re gearing up for the latest mobile operating systems to hit the market. With the Apple iOS 11 release right around the corner, the time is now for IT and security leaders to zero in on their Apple iOS management strategy to prepare for the myriad changes set to affec
Publish At:2017-08-23 22:25 | Read:462 | Comments:0 | Tags:Mobile Security Apple apple releases Enterprise Mobility iOS

Fighting Financial Fraud in an Increasingly Digital World

Everywhere we look, we see some form of digital technology. People have access to computers, cellphones, televisions and even Wi-Fi-enabled smart appliances. Technology advances every day, giving way to exciting, innovative and life-changing experiences. Take cellphones, for example. Not too long ago, cellphones were a luxury. They were used simply to call p
Publish At:2017-08-22 09:30 | Read:379 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Financial Frau

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud