HackDig : Dig high-quality web security articles for hacker

Don’t Respond to Suspicious Emails

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/responding%20to%20threats.png?width=300&amp;name=responding%20to%20threats.png" alt="responding to threats" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">Sometimes when sending phishing simulations to our clients, we setup a reply-to address to see if people will
Publish At:2019-10-29 10:40 | Read:1535 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

More Bees with Honey? Reinforcement vs. Punishment in a Security Training Program

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Copy%20of%20Copy%20of%20Social%20Media%20phishing.png?width=300&amp;name=Copy%20of%20Copy%20of%20Social%20Media%20phishing.png" alt="Copy of Copy of Social Media phishing" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">Ambassadors of security training programs oft
Publish At:2019-10-22 16:15 | Read:523 | Comments:0 | Tags:security awareness training NCSAM

NCSAM: It’s Everyone’s Job to Ensure Online Safety at Work

October is National Cyber Security Awareness Month (NCSAM). NCSAM is a great initiative to help educate and inform our friends and family on the importance of taking your digital security seriously. To help continue to support this initiative, we asked a range of industry experts to share some of their tips to help us stay safe online.Angus Macrae | Head of
Publish At:2019-10-18 10:10 | Read:775 | Comments:0 | Tags:Featured Articles Security Awareness cybersecurity NCSAM Res

Beware of Account Takeover

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/account%20takeover.png?width=300&amp;name=account%20takeover.png" alt="account takeover" width="300" style="width: 300px; margin: 0px 0px 10px 10px; float: right;">One way to verify if an email is legitimate is to look at the sender’s address, the actual sender’s address, not just the sender
Publish At:2019-10-15 10:40 | Read:512 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

A week in security (October 7 – 13)

Last week on Malwarebytes Labs, we peered into the possible future of cybersecurity insurance, described the process for securing today’s managed service provider, and provided an in-depth explainer on the business espionage tactic known as “war shipping.” Further, in considering the intersection of National Cybersecurity Awareness Month and National Dom
Publish At:2019-10-14 23:20 | Read:799 | Comments:0 | Tags:A week in security amazon body cams bots chrome cybersecurit

Grease the Skids: Improve Training Successes by Optimizing the Environment

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/NCSAM%202.png?width=300&amp;name=NCSAM%202.png" alt="NCSAM 2" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">You have carefully selected a training program. Employees are completing the courses. And yet, they are not reporting suspicious emails and their passwords
Publish At:2019-10-11 22:40 | Read:747 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

How to protect against stalkerware, a murky but dangerous mobile threat

Last week, we pledged that—in honor of National Cybersecurity Awareness and Domestic Violence Awareness months—we would continue the fight against the online scourge known as stalkerware, or applications used to track and spy on victims without their knowing consent. We told readers that, despite working to protect against stalkerware programs for more th
Publish At:2019-10-09 11:20 | Read:786 | Comments:0 | Tags:Stalkerware domestic abuse domestic violence monitoring moni

A week in security (September 30 – October 6)

Last week on Malwarebytes Labs, Malwarebytes renewed its pledge to fight stalkerware for National Cybersecurity Awareness (NCSA) and Domestic Violence Awareness Month. We also looked into what security orchestration is and reported about partnering with security firm, HYAS, to determine the relationship between Magecart Group 4 and Cobalt, the infamous APT
Publish At:2019-10-07 23:20 | Read:1226 | Comments:0 | Tags:A week in security Adwind RAT APT Cobalt consumer behavior s

Device & App Safety Guide for Families

While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time to come together and turn up the volume on the digital safety and security conversation worldwide. To kick off that effort, here’s a comprehensive Device and App Safety Guide to give your family quick ways to boost safety and secu
Publish At:2019-10-06 11:20 | Read:1867 | Comments:0 | Tags:Family Safety #BeCyberSmart #NCSAM #CyberAware anonymous app

For Cybersecurity and Domestic Violence Awareness months, we pledge to fight stalkerware

Starting today, two hallmark holidays are upon us. No, it’s not Halloween and Thanksgiving. It’s both Cybersecurity Awareness Month and Domestic Violence Awareness Month. It’s no coincidence these two awareness campaigns overlap. What were once seen as separate realities—the physical and the digital—are increasingly blurred as our offices, schools, and ho
Publish At:2019-10-01 23:20 | Read:578 | Comments:0 | Tags:Stalkerware Browser guard cyberstalking domestic violence do

Training Not Sinking In? Try a Programmatic Approach

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Programmatic%20approach.png?width=300&amp;name=Programmatic%20approach.png" alt="Programmatic approach" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">In honor of National Cybersecurity Awareness Month (CSAM), Dane Boyd, PhishLabs’ Security Training Manager, and I
Publish At:2019-10-01 10:40 | Read:604 | Comments:0 | Tags:security awareness training Cyber Security Awareness Month N

3 ICS Security Incidents that Rocked 2016 and What We Should Learn from Them

Physical and digital systems are increasingly linked together in modern industrial environments like those seen in the United States. While this connectivity automates the management of industrial control systems (ICS), it also means a digital attack against our nation’s critical infrastructure could negatively affect users’ physical health and s
Publish At:2016-11-01 00:45 | Read:5752 | Comments:0 | Tags:Featured Articles ICS Security CISR ics malware NCSAM securi

Computer Crime Never Pays, and These 5 Stories Prove It

It’s no secret that some computer crime can generate a lot of money. For example, the author of Cerber ransomware relies on an affiliate system to distribute their creation. The malware developer collects only a fraction of the ransom payments, the average value of which usually amounts to around one Bitcoin. But even with just 0.3 percent of victims p
Publish At:2016-10-17 04:35 | Read:4124 | Comments:0 | Tags:Featured Articles Government Cerber computer crime hack IT S

Towards a Cyber Resilience Strategy

As most of you already know, October is National Cyber Security Awareness Month (NCSAM). The aim of NCSAM is to raise awareness across the international community about cyber threats, discuss best practices, and educate the public and private sector on how to stay safe online.Given the opportunity, let’s talk about the UK’s cyber security clusters and how yo
Publish At:2016-10-13 08:40 | Read:3522 | Comments:0 | Tags:Cyber Security Featured Articles breach cyber resilience cyb

Expert Advice on How to Create a Security Culture at the Workplace

We at The State of Security kicked off National Cyber Security Awareness Month (NCSAM) 2016 with a review of how companies can defend against common IT security threats. In one guide, we discussed how organizations can leverage their people, processes and technologies to protect against the likes of phishing and other risks. We then crafted strategies for ho
Publish At:2016-10-10 07:40 | Read:3734 | Comments:0 | Tags:Cyber Security Featured Articles Australian Cybercrime Onlin

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud