HackDig : Dig high-quality web security articles for hacker

Over 1 billion people’s data leaked in an unsecured server

Data enrichment companies are big business these days. They merge the data stored by other companies with third-party data in order for these companies to be able to take more informed decisions. Enriched data provides deeper insights into the companies’ customers, which allows them to adjust their business model so that it better adapts to their current or
Publish At:2019-12-05 10:35 | Read:72 | Comments:0 | Tags:Business News advanced cybersecurity data breach

UK Labour Party Promises Free Fibre Broadband For All

The UK election finally takes place on December 12th and each of the parties has been busily campaigning to secure as many votes as possible. Along the way, many announcements and pledges have been made, as politicians outline their vision of a future under a government they lead. The Labour, Conservatives and Liberal Democrat parties have all declared headl
Publish At:2019-12-05 09:15 | Read:120 | Comments:0 | Tags:Mobile News News news technology

Cyber criminals targeting Olympics

The Olympics Goes Political As State Hackers Target Sporting Organisations As a celebration of international sport, the Olympic Games is famously non-political. By inviting every nation to participate, the Games are intended to bring the entire world together, promoting peace and harmony through a celebration of sport. Winning a gold medal may be the pinnacl
Publish At:2019-11-30 09:15 | Read:109 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity news

Chinese Hackers Reportedly Target Belgian Trade Mission

A recent Belgian economic mission to China was reportedly a target of multiple cyberattacks. According to multiple news reports, attacks were carried out at a hotel in Beijing where the convoy was staying. Hackers placed three mobile masts around the hotel to which all connections go, and targeted smartphones with the Bluetooth function turned on.  This att
Publish At:2019-11-25 19:10 | Read:239 | Comments:0 | Tags:News cyber security mobile devices

5 Security Questions You Must Answer While Briefing the Board on Cyber Risk

Are you all set to brief your board on the cyber risk of an organization? If yes, you must know how to respond to your board’s most likely security questions. According to a study conducted by Gartner, 100% of employees from large enterprises will have to explain their board of directors about the risks and vulnerabilities that exist in their techno
Publish At:2019-11-25 13:50 | Read:400 | Comments:0 | Tags:News

Georgia suffers the largest cyberattack in its history

These days, every organization is a potential victim of a cyberattack. This year we’ve seen a wide range of organizations fall into the trap of cybercrime, from oil companies and banks, to public administrations such as city halls or critical infrastructure. All of them are susceptible to becoming targets of serious cyberincidents. These IT security intrusio
Publish At:2019-11-19 10:35 | Read:121 | Comments:0 | Tags:Business News advanced cybersecurity business cyberwar

WhatsApp spyware is being used to curtail the freedom of the press in India

In most cases malware is associated with theft. From keyloggers that collect passwords and credit card details to sophisticated tools for breaking into secure company networks, malware has many uses – mostly for committing crime. However, a new use has emerged in recent months – citizen surveillance. Political activists and journalists under investigation Me
Publish At:2019-11-15 09:15 | Read:174 | Comments:0 | Tags:Mobile News News Social Media cyberattacks Cybercrime WhatsA

Zimperium Announces Mobile Threat Defense for BYOD users with Microsoft Intune

Today, Microsoft announced an exciting new capability providing additional benefits to users of apps protected by Microsoft Intune app protection policies. You can read the official announcement here. Zimperium device risk-based evaluation is now integrated with Microsoft Intune for protected apps on non-enrolled devices to add another layer of protection f
Publish At:2019-11-12 00:25 | Read:199 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News Partners BYOD Ent

Zimperium and Google Partner to Fight Bad Apps through App Defense Alliance

We are thrilled to announce Google has selected us to help ensure the safety of the millions of apps in the Google Play Store through its App Defense Alliance.    As a member of the App Defense Alliance, Google will provide us access to mobile apps as they are being queued to publish in the Google Play Store. Through our advanced machine learning-based z9 t
Publish At:2019-11-12 00:25 | Read:212 | Comments:0 | Tags:Android Machine Learning Mobile Malware Mobile Security News

Twitter Says No to Political Advertising

It is not that often that we see a company offering social media networking services voluntarily cut down a portion of its major revenue generator – advertising. Earlier this week, Twitter’s CEO Jack Dorsey surprisingly announced that Twitter would no longer accept political advertising campaigns. In a series of Tweets sent from his official profile account
Publish At:2019-11-11 22:35 | Read:148 | Comments:0 | Tags:Mobile News News Social Media cybersecurity social media

Halloween Cybersecurity Horror Stories 2019

Horror stories are an important tradition – and it turns out the world of cybersecurity has plenty to tell. Here are three genuine bone-chillers. The zombie phone outbreak With more than 1.5 billion users every month, WhatsApp is by far the world’s most popular messaging service. Available on Android, iOS and other mobile devices, the app connects people acr
Publish At:2019-10-25 04:15 | Read:423 | Comments:0 | Tags:Mobile News News Security cybersecurity tips

Zuckerberg Roasted over Libra

Facebook’s CEO Mark Zuckerberg got roasted with questions about the company’s involvement in the new ambitious cryptocurrency project called Libra. Even though the hearing before Congress was predominantly about Libra, the members of Congress used this as an opportunity to ask questions for other topics that included the Cambridge Analytica scandal, the mult
Publish At:2019-10-25 04:15 | Read:335 | Comments:0 | Tags:Mobile News News Social Media cybersecurity Facebook

Elon Musk Destroys Smartphones For Security Reasons

Elon Musk destroys all his old smartphones: that’s why The real-life Tony Stark is supposedly often replacing and even destroying his smartphone for security reasons, a court filing revealed earlier this month. Elon Musk is currently being sued over a demeaning Tweet he sent targeting a British diver, and details in the statement filed as a part of the
Publish At:2019-10-23 09:15 | Read:532 | Comments:0 | Tags:Mobile News News Security Antivirus cybersecurity news

RobbinHood: the ransomware that exploits its own reputation

Back in May, the city of Baltimore was brought to a standstill. All of the city hall’s systems were infected with a new ransomware variant called RobbinHood. The cyberattacker demanded a 13 bitcoin ($76,000; €68.9612) ransom to decrypt the systems. This same variant was first seen in an attack on the city of Greenville, North Carolina in April. RobbinHood us
Publish At:2019-10-23 04:15 | Read:318 | Comments:0 | Tags:Business Malware News advanced cybersecurity Ransomware expl

Filesystem-Eating Bug Discovered in Linux 4.14

Recent news has reported that an urgent data corruption issued has destroyed file systems in Linux 4.14 and if you are using bcache to speed up your Linux 4.14 you are being urged to stop it immediately if you want your data to survive. Linux Compatibility Linux is an open-source technology and hundreds of programmers have been involved with adding softwar
Publish At:2019-10-18 04:40 | Read:275 | Comments:0 | Tags:Articles News bcache filesytem kernbel linux

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud