HackDig : Dig high-quality web security articles for hacker

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

After the FBI issued a warning on internet-connected toys in July, researchers began digging into these devices to assess their functions as they relate to cybersecurity. But before describing what one of these toys can do, it might be helpful to explain how they work at a very high level. Typical Components of Internet-Connected Toys The first component of
Publish At:2017-09-18 17:25 | Read:124 | Comments:0 | Tags:Cloud Security Mobile Security Cloud Cloud Applications Conn

BlueBorne Bluetooth hack could affect millions of smartphones

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time. But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use
Publish At:2017-09-15 08:00 | Read:183 | Comments:0 | Tags:Mobile News Mobile Security Android Hackers Malware

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest
Publish At:2017-09-05 09:35 | Read:133 | Comments:0 | Tags:Data Protection Asset Management Compliance Data Security En

Oreo and the sweet history of Android versions

Oreo Android, the sweetest version? What does an Oreo cookie, a donut, a marshmallow or a lollipop have to do with your smartphone? Well, believe it or not, the names of all those sweets indicate the Android operating system installed on your cell phone. After months of speculation about the new features to be included in the new Android operating system, Au
Publish At:2017-08-29 02:40 | Read:217 | Comments:0 | Tags:Mobile News Mobile Security Technology Android smartphones

What is Net Neutrality and How to Voice Your Opinion?

What happens when cable and phone companies are left to their own devices? Federal Communications Commission (FCC) will soon stop accepting comments on Net Neutrality. There has been a lot of confusion amongst people who are either not technology savvy or not familiar enough with the ongoing debate. We spent years following the conversation and researching t
Publish At:2017-08-28 05:20 | Read:259 | Comments:0 | Tags:Mobile Security News Security Communications Internet Securi

Personal Electronic Devices Dodge TSA Ban — For Now

At least for the time being, business travelers will still be able to take their laptops and tablets along as carry-on luggage when they board a flight. That is the decision by the Transportation Safety Administration (TSA), which lifted its ban on air passengers carrying aboard personal electronic devices larger than a smartphone earlier this summer. The
Publish At:2017-08-25 11:15 | Read:228 | Comments:0 | Tags:Mobile Security Endpoint Security Mobile Devices Transportat

Facebook Telepathy Texting – Could It Be Hacked?

Is telepathy texting the next step in technology communications? With over 2 billion registered members, Facebook is the world’s most popular online service. But to maintain that title, Facebook is constantly developing new services to keep people logging in. In a recent video conference, Facebook chief Mark Zuckerberg discussed one of the cutting edge proje
Publish At:2017-08-25 06:35 | Read:202 | Comments:0 | Tags:Mobile Security News Social Media Facebook social media tech

iOS 11 in the Enterprise: Get Your iPads Ready

While some are in back-to-school mode and others are getting ready for football, we’re gearing up for the latest mobile operating systems to hit the market. With the Apple iOS 11 release right around the corner, the time is now for IT and security leaders to zero in on their Apple iOS management strategy to prepare for the myriad changes set to affec
Publish At:2017-08-23 22:25 | Read:241 | Comments:0 | Tags:Mobile Security Apple apple releases Enterprise Mobility iOS

Fighting Financial Fraud in an Increasingly Digital World

Everywhere we look, we see some form of digital technology. People have access to computers, cellphones, televisions and even Wi-Fi-enabled smart appliances. Technology advances every day, giving way to exciting, innovative and life-changing experiences. Take cellphones, for example. Not too long ago, cellphones were a luxury. They were used simply to call p
Publish At:2017-08-22 09:30 | Read:219 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Financial Frau

Across the Great Divide: Measuring Security Awareness Among US and UK Users

End users in the U.S. and U.K. have very different attitudes toward security. Earlier this summer, Wombat Security surveyed more than 2,000 working adults — half in the U.S. and half in the U.K. — about various cybersecurity topics and perceptions of best practices. The researchers found some interesting surprises and noted a series of different attitudes a
Publish At:2017-08-18 13:25 | Read:273 | Comments:0 | Tags:Risk Management Cybersecurity Mobile Security Password Manag

Fake Snapchat in Google Play Store

Introduction   Zimperium discovered and reported a fake version of the popular Snapchat app in the official Google Play Store; At the time of our discovery, it was the second result when searching for “Snapchat”. The fake version of Snapchat app is using “Snap Inc .” as Company Name, with a  ” .” appended to original name. Fake
Publish At:2017-08-11 02:50 | Read:415 | Comments:0 | Tags:Android Mobile Malware Mobile security Mobile Threat Defense

ZPI: One approach to rule them all

Introduction In 1975, a book was published that changed the way we approach complex problems. Inspired on how nature works “Adaptation in Natural and Artificial Systems” set the bases of genetic algorithms. The release date of this blogpost is strongly linked to that book, it is a symbolic tribute to its author, John Henry Holland, who passed out
Publish At:2017-08-10 08:55 | Read:336 | Comments:0 | Tags:Android iOS Mobile security Mobile Threat Defense Windows Ze

O Me, O My! Android O and Its Impact on the Enterprise

As the summer winds down, the next big wave of mobile OS updates is upon us — a seasonal trend that brings about excitement and positive change for both consumers and security leaders. With Google Android O version 8.0 set for imminent release, we’ve lined up some new features to look out for in the context of the mobile enterprise to ensure that you
Publish At:2017-08-08 16:20 | Read:265 | Comments:0 | Tags:Mobile Security Android Android Apps Android Security Google

Jailbreak versus Compromise…

We see a lot of confusion in the market about precisely what it means to jailbreak a device–and that confusion could lead to serious problems, especially with regard to the notion of a hacker performing a jailbreak to attack a device. The security industry is notoriously full of acronyms, buzzwords and generally opaque jargon. Here at Zimperium, we try
Publish At:2017-08-08 13:55 | Read:338 | Comments:0 | Tags:iOS Mobile security Mobile Threat Defense Exploit jailbreak

Master the Basics to Manage IoT Security Risks

The very term Internet of Things (IoT) can sound like the buzziest of buzzwords. We all know we need to be aware of and plan for it, but sifting through all the security guidance about the IoT can be overwhelming. Moving Beyond Buzzwords To help cut through the noise, IBM released a new report, “Smart Things Call for Smart Risk Management,” detai
Publish At:2017-08-04 01:45 | Read:350 | Comments:0 | Tags:Mobile Security Risk Management Cognitive Security Connected

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud