HackDig : Dig high-quality web security articles for hacker

Serious security breach in Internet Explorer: Microsoft warns against use

A critical vulnerability in Internet Explorer, with the identifier CVE-2020-0674 has been published by Microsoft. It allows attackers to remotely execute code using the JScript.dll library. A security patch is currently being created. On the first patch Tuesday of 2020, Microsoft released 49 updates; shortly afterwards, the vendor reported a new zero-day sec
Publish At:2020-01-21 09:15 | Read:188 | Comments:0 | Tags:News Security Germany Microsoft vulnerability

Help?! Possible global hacker attack by Citrix vulnerability

Following another official vulnerability alert issued in the past 48 hours, which has been known since December, companies still protected from this new attack are continuously receiving new requests for help. CISA considers the vulnerability to be one of the most dangerous exploits of recent years. Potentially, some 80,000 companies worldwide are at risk. T
Publish At:2020-01-17 09:15 | Read:308 | Comments:0 | Tags:News Security business Exploit Germany vulnerability Vulnera

The new critical vulnerability in Windows 10 has a solution: UPDATE NOW

Yesterday, January 14, Microsoft launched a patch for a critical security vulnerability in Windows 10, and Windows Server 2016 and 2019, among others. The vulnerability, categorized as CVE-2020-0601, which was discovered by the NSA, affects a component known as CryptoAPI (Crypt32.dll). Among the features of the CryptoAPI component is its use in digital signa
Publish At:2020-01-15 16:15 | Read:221 | Comments:0 | Tags:Business News patch management vulnerabilities windows 10 Vu

The CCPA: the new data protection law for California

In May 2020, the GDPR turns two. This European data protection regulation has been obligatory since 2018, and allows fines of up to 4% of a company’s annual global turnover. Since it was implemented, this regulation has been used to hand million-euro fines to such large companies as British Airways and Marriott International. In the last few months, we have
Publish At:2020-01-14 10:35 | Read:158 | Comments:0 | Tags:Business News data breach data protection

Cybersecurity trends to look out for in 2020

The rise of cybersecurity threats in 2019 has made corporations across the globe, increasingly aware of the importance of security measures needed to combat these threats. There are a plethora of questions from a cybersecurity perspective that need answering. What are the tech trends and associated risks? What will be the new strategy of attackers and what i
Publish At:2020-01-13 01:50 | Read:284 | Comments:0 | Tags:News Security Advisory cybersecurity security advisory

US-Iran conflict shifted to the Cyber World

Iranian Hackers Launched Thousands of Cyber Attacks against the USA The tension between the USA and Iran significantly increased after the USA’s drone strike that eliminated Iran’s Gen. Qassem Soleimani. Iran promised to retaliate and launched a dozen unsuccessful missiles aiming at Iraqi bases housing U.S. troops. Iran rockets even landed in the Green Zone
Publish At:2020-01-09 09:15 | Read:316 | Comments:0 | Tags:Mobile News News Security cyberattacks

How to Select a Penetration Testing Provider Perfect for Your Business?

Penetration Testing has become one of the best ways to combat cybersecurity risks. With a sudden growth in cyber breaches taking place across the globe, security-aware businesses are looking at ways to secure their database in the most efficient way possible. Thus, the demand for experts in penetration testing has grown exponentially and is showing no signs
Publish At:2020-01-08 01:50 | Read:209 | Comments:0 | Tags:News Security Advisory pen testing as a service penetration

Panda Security: 100% corporate endpoint protection according to AV-Comparatives

Panda Security regularly participates in tests to evaluate the protection levels and performance of our security solutions. The latest test in which we have participated is AV-Comparatives’ Business Security Test for August to November. The independent laboratory has discovered that Panda Security’s solution has achieved maximum levels of protection. Betwee
Publish At:2019-12-23 10:35 | Read:248 | Comments:0 | Tags:Business News AV Comparatives endpoint protection test

Top 5 Mobile Security Stories of 2019

Mobile security has certainly seen its fair share of headlines in 2019 prompting individuals and enterprises to realize mobile devices are another endpoint – like laptops and computers – in need of protecting. I thought it would be fun to look back at some of those stories that helped propel mobile security into the forefront of the minds of CIS
Publish At:2019-12-20 17:25 | Read:380 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News advanced mobile t

Smartphones are ruining our health

Smartphones have changed the world by making it much easier to stay in touch with friends and work. But this convenience may come at a cost if the results of a new UK survey are correct. Manufacturer OnePlus found that one in four UK adults have trouble sleeping because they spend too long on their phones before bed. The blue light emitted by electronic scre
Publish At:2019-12-12 10:35 | Read:257 | Comments:0 | Tags:Mobile News News

Facial recognition at all U.S. airports

U.S. Citizens May Soon Required to Pass Facial Recognition Checks at All U.S. Airports The Department of Homeland Security (DHS) wants to amend the current regulations and start requiring all travelers, including U.S. citizens and legal permanent residents, to be photographed upon entry and/or departure of any U.S. airport. The current rule states that any t
Publish At:2019-12-09 10:35 | Read:413 | Comments:0 | Tags:Mobile Security News news Privacy technology

Over 1 billion people’s data leaked in an unsecured server

Data enrichment companies are big business these days. They merge the data stored by other companies with third-party data in order for these companies to be able to take more informed decisions. Enriched data provides deeper insights into the companies’ customers, which allows them to adjust their business model so that it better adapts to their current or
Publish At:2019-12-05 10:35 | Read:278 | Comments:0 | Tags:Business News advanced cybersecurity data breach

UK Labour Party Promises Free Fibre Broadband For All

The UK election finally takes place on December 12th and each of the parties has been busily campaigning to secure as many votes as possible. Along the way, many announcements and pledges have been made, as politicians outline their vision of a future under a government they lead. The Labour, Conservatives and Liberal Democrat parties have all declared headl
Publish At:2019-12-05 09:15 | Read:350 | Comments:0 | Tags:Mobile News News news technology

Cyber criminals targeting Olympics

The Olympics Goes Political As State Hackers Target Sporting Organisations As a celebration of international sport, the Olympic Games is famously non-political. By inviting every nation to participate, the Games are intended to bring the entire world together, promoting peace and harmony through a celebration of sport. Winning a gold medal may be the pinnacl
Publish At:2019-11-30 09:15 | Read:413 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity news

Chinese Hackers Reportedly Target Belgian Trade Mission

A recent Belgian economic mission to China was reportedly a target of multiple cyberattacks. According to multiple news reports, attacks were carried out at a hotel in Beijing where the convoy was staying. Hackers placed three mobile masts around the hotel to which all connections go, and targeted smartphones with the Bluetooth function turned on.  This att
Publish At:2019-11-25 19:10 | Read:396 | Comments:0 | Tags:News cyber security mobile devices


Share high-quality web security related articles with you:)


Tag Cloud