HackDig : Dig high-quality web security articles for hacker

Halloween Cybersecurity Horror Stories 2019

Horror stories are an important tradition – and it turns out the world of cybersecurity has plenty to tell. Here are three genuine bone-chillers. The zombie phone outbreak With more than 1.5 billion users every month, WhatsApp is by far the world’s most popular messaging service. Available on Android, iOS and other mobile devices, the app connects people acr
Publish At:2019-10-25 04:15 | Read:209 | Comments:0 | Tags:Mobile News News Security cybersecurity tips

Zuckerberg Roasted over Libra

Facebook’s CEO Mark Zuckerberg got roasted with questions about the company’s involvement in the new ambitious cryptocurrency project called Libra. Even though the hearing before Congress was predominantly about Libra, the members of Congress used this as an opportunity to ask questions for other topics that included the Cambridge Analytica scandal, the mult
Publish At:2019-10-25 04:15 | Read:202 | Comments:0 | Tags:Mobile News News Social Media cybersecurity Facebook

Elon Musk Destroys Smartphones For Security Reasons

Elon Musk destroys all his old smartphones: that’s why The real-life Tony Stark is supposedly often replacing and even destroying his smartphone for security reasons, a court filing revealed earlier this month. Elon Musk is currently being sued over a demeaning Tweet he sent targeting a British diver, and details in the statement filed as a part of the
Publish At:2019-10-23 09:15 | Read:246 | Comments:0 | Tags:Mobile News News Security Antivirus cybersecurity news

RobbinHood: the ransomware that exploits its own reputation

Back in May, the city of Baltimore was brought to a standstill. All of the city hall’s systems were infected with a new ransomware variant called RobbinHood. The cyberattacker demanded a 13 bitcoin ($76,000; €68.9612) ransom to decrypt the systems. This same variant was first seen in an attack on the city of Greenville, North Carolina in April. RobbinHood us
Publish At:2019-10-23 04:15 | Read:228 | Comments:0 | Tags:Business Malware News advanced cybersecurity Ransomware expl

Filesystem-Eating Bug Discovered in Linux 4.14

Recent news has reported that an urgent data corruption issued has destroyed file systems in Linux 4.14 and if you are using bcache to speed up your Linux 4.14 you are being urged to stop it immediately if you want your data to survive. Linux Compatibility Linux is an open-source technology and hundreds of programmers have been involved with adding softwar
Publish At:2019-10-18 04:40 | Read:222 | Comments:0 | Tags:Articles News bcache filesytem kernbel linux

Spectre and Meltdown explained

I found this great article of Anton Gostev about Spectre and Meltdown, so I’m reposting it here : By now, most of you have probably already heard of the biggest disaster in the history of IT – Meltdown and Spectre security vulnerabilities which affect all modern CPUs, from those in desktops and servers, to ones found in smartphones. Unfortunately, ther
Publish At:2019-10-18 04:40 | Read:315 | Comments:0 | Tags:Articles News bug meltdown security spectre

Prying-Eye: the vulnerability that opens the door to industrial espionage

Industrial espionage is a serious problem for companies. And these days, cyberattacks make it easier than ever to access confidential information or patents found inside an organization. If a cyberattacker manages to steal this kind of data, the victim could be seriously damaged. And not just at a reputational level, but also economically speaking:  a stolen
Publish At:2019-10-15 22:35 | Read:236 | Comments:0 | Tags:News Security business vulnerabilities Vulnerability

Magecart is back: hotels in the firing line

Back in July, a group of cyberattackers called Magecart made the e-commerce word shake. Its malicious skimming code, which is inserted into the websites of these businesses to steal personal and financial data from their customers when making purchases, was discovered on nearly 18,000 domains. And this incident wasn’t the only one. A year ago, British Airway
Publish At:2019-10-11 10:35 | Read:212 | Comments:0 | Tags:News Security business hotel chains supply chain

Panda Security and Infinigate France sign a distribution agreement.

This partnership is perfectly in line with Panda Security’s strategy of developing its network of partners in order to accelerate its growth on the B2B market in France. Panda Security France officially announces a new distribution agreement with Infinigate France, one of the main European VADs operating in the cybersecurity sector. This decision fol
Publish At:2019-10-10 10:35 | Read:314 | Comments:0 | Tags:News Panda Security business edr france

OpenDreamBox: the vulnerability that affects 32% of the world’s companies

The Internet of things (IoT) has revolutionized the business world. It has helped to streamline industrial processes, reduce costs, and has even created new business models. But, as is often the case, all of these advantages go hand in hand with a series of disadvantages. The most important of these disadvantages is the significant increase in the attack sur
Publish At:2019-10-09 10:35 | Read:328 | Comments:0 | Tags:News Security business IoT vulnerabilities Vulnerability

Ransomware hits several Spanish city halls

Ransomware is back. Well, in fact, it never went away. However, what is true that from time to time we see more aggressive campaigns with a wider impact, or attacks that are more striking or more flashy. The list of institutions affected by this kind of malware this year keeps growing. In May, the city of Baltimore was attacked with a strand of ransomware ca
Publish At:2019-10-08 10:35 | Read:265 | Comments:0 | Tags:Malware News business governments Ransomware

A run-time approach for penetration testing of iOS apps Part-I

Hello everybody, This article will cover dynamic run-time penetration testing of iOS applications using objection framework. Objection is a run-time mobile exploration toolkit, powered by Frida. Objection injects uses Frida to injects objects into application run-time in order to execute certain tasks in security context. Objection framework let
Publish At:2019-10-07 07:25 | Read:421 | Comments:0 | Tags:News infosec ios applications iospentesting Mobile Applicati

A run-time approach for pen-testing iOS applications Part-II (Objection in Action)

Objection in Action Once all things go right, we can inject Frida scripts into our target application. Open target application and enter following command in powershell objection -g YOUR-APPLICATION-NAME explore You will now have access to application’s file over device’s shell Test Cases: > Application exploration: 1. To brows
Publish At:2019-10-07 07:25 | Read:347 | Comments:0 | Tags:News infosec ios ios applications iospentesting Mobile Appli

UK Government Warn Schools Over Cyberthreats

The subject of cybersecurity within the education sector is a key topic at the moment, particularly with the rise in reported ransomware incidences and data breaches. The National Cyber Security Centre (NCSC), tasked with providing cybersecurity advice and support to the UK public and private sectors, has released a report on The cyber threat to Universities
Publish At:2019-10-04 10:35 | Read:258 | Comments:0 | Tags:News business education UK

Health Data of 5 Million Americans Freely Accessible Online

Personal details of approximately 5 million U.S. residents that include security information, X-rays and MRIs, and in some cases even SSNs are sitting readily available for anyone “armed” with a browser and access to the internet. In a collaboration between ProPublica and the German broadcaster Bayerischer Rundfunk, the media organizations identi
Publish At:2019-10-03 10:35 | Read:364 | Comments:0 | Tags:Mobile News News cybersecurity Privacy


Share high-quality web security related articles with you:)


Tag Cloud