HackDig : Dig high-quality web security articles for hacker

Twitter Says No to Political Advertising

It is not that often that we see a company offering social media networking services voluntarily cut down a portion of its major revenue generator – advertising. Earlier this week, Twitter’s CEO Jack Dorsey surprisingly announced that Twitter would no longer accept political advertising campaigns. In a series of Tweets sent from his official profile account
Publish At:2019-11-11 22:35 | Read:78 | Comments:0 | Tags:Mobile News News Social Media cybersecurity social media

What are the signs of video game addiction in children?

In the past, it was not easy for parents to get children back home after a long day of playing outside. The little ones enjoyed the outdoors so much that they didn’t want the day to end. Such behavior kept creating a challenge for parents who wanted them back home. In the last decade, things have changed, and the outdoor activities were replaced by spending
Publish At:2019-11-11 22:35 | Read:101 | Comments:0 | Tags:Family Safety Mobile News Parental Control tips

Android smartphone owners fall victim to new ‘unremovable’ malware variant

No matter how destructive or invasive, Android malware can usually be removed from an infected device. But a new variant is causing problems for users. Known as xHelper, this new malware is causing a number of problems – not least the fact that it cannot be easily uninstalled. Normally deleting affected apps is enough to stop the infection, but not so with x
Publish At:2019-11-11 22:35 | Read:49 | Comments:0 | Tags:Malware Mobile News Mobile Security Android cybersecurity

Problems with your pc? When to use Panda’s free technical support

Panda Security is well-known for its expertise in detecting, preventing and removing malware infections. But as any PC owner knows, there’s a lot of other things that can go wrong. The sort of problems that take time and expertise to fix. So we’ve made your Panda Dome subscription even better. Now anyone with a valid subscription can get free technical suppo
Publish At:2019-10-28 10:35 | Read:253 | Comments:0 | Tags:Mobile News Panda Security cybersecurity security technology

Halloween Cybersecurity Horror Stories 2019

Horror stories are an important tradition – and it turns out the world of cybersecurity has plenty to tell. Here are three genuine bone-chillers. The zombie phone outbreak With more than 1.5 billion users every month, WhatsApp is by far the world’s most popular messaging service. Available on Android, iOS and other mobile devices, the app connects people acr
Publish At:2019-10-25 04:15 | Read:209 | Comments:0 | Tags:Mobile News News Security cybersecurity tips

Zuckerberg Roasted over Libra

Facebook’s CEO Mark Zuckerberg got roasted with questions about the company’s involvement in the new ambitious cryptocurrency project called Libra. Even though the hearing before Congress was predominantly about Libra, the members of Congress used this as an opportunity to ask questions for other topics that included the Cambridge Analytica scandal, the mult
Publish At:2019-10-25 04:15 | Read:202 | Comments:0 | Tags:Mobile News News Social Media cybersecurity Facebook

Elon Musk Destroys Smartphones For Security Reasons

Elon Musk destroys all his old smartphones: that’s why The real-life Tony Stark is supposedly often replacing and even destroying his smartphone for security reasons, a court filing revealed earlier this month. Elon Musk is currently being sued over a demeaning Tweet he sent targeting a British diver, and details in the statement filed as a part of the
Publish At:2019-10-23 09:15 | Read:271 | Comments:0 | Tags:Mobile News News Security Antivirus cybersecurity news

Instagram flaw exposes private information

Instagram users are being warned of a security loophole that could be used to expose their private posts. This means that private posts and messages could be shared with almost anyone – not just trusted friends. Perhaps more worrying is the fact that there are no special tools required to accessing secret posts. It’s all about addresses Every single webpage
Publish At:2019-10-17 10:35 | Read:206 | Comments:0 | Tags:Mobile News Social Media Privacy social media VPN

How to respond to cybercriminals?

Most of the cyber criminals are money-driven, so their main goal is to put their hands on your hard-earned money somehow. They can do it in various ways such as; by locking your system with ransomware and asking for a ransom; by obtaining sensitive materials so they can try to blackmail their way to your money; or they may decide to steal your login details
Publish At:2019-10-14 10:35 | Read:291 | Comments:0 | Tags:Mobile News Security Tips Cybercrime cybersecurity Ransomwar

Do humans listen to the recordings made by smart assistants?

Smart assistants such as Siri, Alexa, and Google Home record snippets of your commands. However, they are not the only ones keeping a record of your voice commands or messages – Facebook’s Messenger app, and Apple’s Messages also record your voice. The tech giants use voice recording to improve their services, and this sometimes involves human review. Most o
Publish At:2019-10-10 10:35 | Read:276 | Comments:0 | Tags:Mobile News privacy Technology cybersecurity Privacy

Cyber security and sustainability – being a better global citizen

The impact of human activity on the environment is becoming clearer every day – and it’s obvious that we face some significant challenges in the near future. Climate change is now a headline issue and we’re all being urged to do our bit by reducing carbon emissions. It’s no surprise then that most people think of ‘sustainability’ in terms of environmental is
Publish At:2019-10-09 10:35 | Read:215 | Comments:0 | Tags:Mobile News Technology Tips

Health Data of 5 Million Americans Freely Accessible Online

Personal details of approximately 5 million U.S. residents that include security information, X-rays and MRIs, and in some cases even SSNs are sitting readily available for anyone “armed” with a browser and access to the internet. In a collaboration between ProPublica and the German broadcaster Bayerischer Rundfunk, the media organizations identi
Publish At:2019-10-03 10:35 | Read:364 | Comments:0 | Tags:Mobile News News cybersecurity Privacy

What is Alexa and how does she work?

Amazon Alexa appears on smart speakers and mobile phones, offering friendly assistance and advice on demand. She can manage your diary, play music, answer questions, order groceries from Amazon and control your smart home devices. But what actually is Alexa? What is Alexa doing? When Amazon describes Alexa as a ‘personal assistant’, they underplay much of he
Publish At:2019-09-30 10:35 | Read:216 | Comments:0 | Tags:Mobile News Panda Security Technology

Smart camera privacy – what you need to know

As the cost of smart home technology falls, more of us are installing internet connected devices. Smart plugs, smart speakers, smart lights and now smart cameras, all designed to make our lives slightly easier. Smart cameras are increasingly popular. They allow us to check in on our sleeping babies, our elderly relatives or our pets. We can see who’s at the
Publish At:2019-09-26 10:35 | Read:281 | Comments:0 | Tags:Mobile News Technology Tips cybersecurity Smart camera

Should you ditch charging cables?

The latest Android and Apple smartphones all offer a new technology called ‘inductive charging’. You simply place the phone on a compatible ‘pad’ and the battery recharges wirelessly. Obviously this is great news for those of us who regularly lose our charging cables, or struggle to insert the plug correctly. But is inductive charging as useful as the manufa
Publish At:2019-09-23 10:35 | Read:168 | Comments:0 | Tags:Mobile News Technology Charging cybersecurity smartphones Wi


Share high-quality web security related articles with you:)


Tag Cloud