HackDig : Dig high-quality web security articles for hackers

DNI and Microsoft warn that multiple countries are trying to influence the elections

Microsoft, a multinational technology company headquartered in the USA, revealed in a blog post that hackers from foreign states have actively targeted people and organizations involved in the upcoming Presidential elections.  The attacks, predominantly coming from Iran, China, and Russia, have been aimed at people associated with both Joe Biden and Presiden
Publish At:2020-09-18 06:57 | Read:39 | Comments:0 | Tags:Mobile News News Security cybersecurity elections hacking

1/3 of Americans Suffer from Digital Amnesia (Survey)

Are digital devices like smartphones, tablets, and computers diminishing our memory? We asked Americans which important phone numbers they can remember and the results were alarming—it’s not a lot. Perhaps the most frightening finding from our survey is that over 82 percent of parents wouldn’t be able to remember their children’s phone number if they had to.
Publish At:2020-09-16 15:51 | Read:134 | Comments:0 | Tags:News Android Apple Infographics news survey tips

How to take your company into the cloud and telecommute securely

A growing number of organizations are opting to migrate their data and applications to the cloud given the numerous benefits that this delivers: cost savings on server maintenance, scalability, and easy access to data from anywhere, to name just three. The latter is particularly important today due to the massive increase in telecommuting in response to the
Publish At:2020-09-15 08:10 | Read:155 | Comments:0 | Tags:Adaptive Defense Business News advanced cybersecurity b2b cl

Did Melania Trump use her private email for Government business?

The First Lady of the United States (FLOTUS), Melania Trump, was accused of conducting government business using private email and messaging apps. Stephanie Wolkoff, a New York-based professional party planner, claimed that Melania Trump ignored security protocols and used Trump organization emails and messaging apps such as Signal and iMessage. The claims c
Publish At:2020-09-09 07:52 | Read:174 | Comments:0 | Tags:Mobile News News Security governments security trump

43 COVID-19 Cybersecurity Statistics

In January 2020, the Coronavirus outbreak started to garner international headlines. On March 11, 2020, the World Health Organization declared COVID-19 a worldwide pandemic. That week, life around the world changed. Bustling streets became empty, hospital beds overflowed, and businesses were faced with the impossible decision of whether or not to close their
Publish At:2020-08-26 11:44 | Read:179 | Comments:0 | Tags:News Security cybersecurity cybersecurity statistics Infogra

The Mirai botnet exploits a new vulnerability affecting companies around the world

Malware or malicious code has been around for over 40 years now, but its use to obtain control of a group of Internet-connected systems in something called a ‘botnet’ is a relatively new phenomenon. Botnets have been behind some of the most costly security incidents of the last 10 years and, consequently, companies around the world are going to great lengths
Publish At:2020-08-26 07:50 | Read:201 | Comments:0 | Tags:Business Malware News b2b botnets Mirai vulnerabilities Vuln

MS Office Macro Malware Makes A Comeback

Once the most popular way to infect computers, Microsoft Office macros had fallen out of favour as users and anti-malware systems got better at spotting and blocking infected attachments. However, it appears that macro malware is currently enjoying something of a comeback, this time attacking Apple Mac computers. Macros provide a way for power users to autom
Publish At:2020-08-19 06:20 | Read:368 | Comments:0 | Tags:Malware Mobile News News Apple cybersecurity Microsoft Windo

Dangerous vulnerabilities discovered in Alexa

Hackers might have stolen your Alexa’s voice library and account information A new Alexa bug, recently revealed by cybersecurity researchers, showed that hackers have been able to target specific individuals and get unauthorized access to their voice library and account information. The vulnerability, now patched by Amazon, has not only been granting access
Publish At:2020-08-17 06:10 | Read:227 | Comments:0 | Tags:Mobile News News alexa cybersecurity Privacy

Twitter insiders? Don’t get accused of spying because of your staff

Just ten days after one of the biggest hacks in the history of Twitter, while both internal and external investigators continue to try figuring out exactly what happened, the social network is once again the subject of brand-tarnishing headlines, this time centered on the company’s poor internal security highlighted by the recent case of Twitter sub-contract
Publish At:2020-08-06 08:23 | Read:345 | Comments:0 | Tags:Adaptive Defense Business News advanced cybersecurity b2b cy

Garmin: the latest wearable attacked by ransomware and a controversial ransom

Garmin, the developer of smartwatches and GPS devices, along with its popular app for monitoring physical exercise and sharing results with other services and devices, has become one of the latest victims of ransomware. On July 27, the company announced the recovery of normal activity after the attack from the WastedLocker ransomware, which first appeared ea
Publish At:2020-08-04 10:03 | Read:216 | Comments:0 | Tags:Adaptive Defense Business Malware News Advac advanced cybers

Twitter Hack Highlights the Realities of Mobile Phishing

Additional light is beginning to shine on the July 15th Twitter breach, where accounts of some of its most high profile users –  including Tesla CEO Elon Musk and celebrities Kanye West and his wife, Kim Kardashian West –  were compromised. The attackers attempted to lure the celebrity followers into sending money to an anonymous Bitcoin account
Publish At:2020-07-31 15:44 | Read:344 | Comments:0 | Tags:News apps mobile devices phishing Twitter

Don’t let ransomware shut your business down!

If there is one characteristic that defines cybercrime today, it is the capacity to evolve and adapt to new environments and the ability to find ways of evading the cybersecurity measures taken by victims. Ransomware is no exception. One of the main features of ransomware as a threat, in addition to kidnapping data, is that it is constantly reinventing itsel
Publish At:2020-07-30 16:00 | Read:211 | Comments:0 | Tags:Adaptive Defense Malware News advanced cybersecurity b2b Ran

EMOTET reemerges after months in hiding

First identified in 2014, Emotet has continued to infect systems and compromise users until now, which has kept it in the news far longer than other threats from the same year. The last version of Emotet was seen back in February, when it was distributed across WLAN networks, highlighting how this malware had evolved from a banker Trojan aimed at stealing fi
Publish At:2020-07-28 15:54 | Read:249 | Comments:0 | Tags:Adaptive Defense Malware News b2b emotet tips

Accomplished Global Sales Leader, Ed Carter, Joins Zimperium as Chief Revenue Officer

Zimperium today announced that Ed Carter has joined the company as Chief Revenue Officer. Leveraging more than 20 years of leadership experience, Ed will play a strategic role in accelerating Zimperium’s industry-leading growth and expansion by leading all global sales and channels.  “We are excited to welcome Ed to the Zimperium team,” said Shridhar Mittal
Publish At:2020-07-28 14:25 | Read:231 | Comments:0 | Tags:News cyber security ZIMPERIUM

Cybersecurity CISO: Webinar on Mobile Apps Phishing & Malware Attacks on Remote Workers

About the Webinar Phishing and Malware attacks on the mobile devices of remote workers have become quite common to gain access to sensitive enterprise data. A thorough discourse about the know-hows of Phishing and Spoofing attacks. This webinar will give insights to security professionals on the vulnerable areas which lead to the successful execution of p
Publish At:2020-07-27 15:47 | Read:314 | Comments:0 | Tags:News Webinar cybersecurity ciso cybersecurity Webinar malwar

Tools

Tag Cloud