HackDig : Dig high-quality web security articles for hacker

Immutable Integrity? – Blockchain Beyond the Bluster

Sometimes you could be forgiven for thinking that the incessant overuse of the word ‘disruptive’ these days could do with some, well, disrupting of its own. So much is written, presented and marketed around apparently ‘disruptive’ use of technologies like AI, IoT and of course blockchain, when much of it could perhaps be better described as foundation innova
Publish At:2017-04-03 10:15 | Read:5511 | Comments:0 | Tags:Off Topic blockchain data security

Ultra Secret Chat Using Wi-Fi Covert Channel

“Covert Channel [Wikipedia]: a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.”Today, in a world where the hacking techniques are getting more and more sophisticated and security meas
Publish At:2017-03-28 06:40 | Read:2840 | Comments:0 | Tags:Off Topic BSides Munich security Wi-Fi

Stop the Most Advanced Adversaries

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits.However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest versions, the list of new exp
Publish At:2017-03-22 03:20 | Read:4836 | Comments:0 | Tags:Featured Articles Off Topic Insider malicious security

10 Must-Read Books for Information Security Professionals

There are many ways for IT professionals to broaden their knowledge of information security. Attending infosec conferences, for instance, provides personnel with an opportunity to complete in-person trainings and network with like-minded individuals. Outside of industry events, analysts can pick up a book that explores a specific topic of information securit
Publish At:2017-03-16 18:05 | Read:4452 | Comments:0 | Tags:Off Topic books Information Security IT

Justifying the Value of Conference Attendance to Your Boss

Over the weekend, I became immersed in a discussion on Twitter centered around getting more people involved in InfoSec conferences. Here’s the original post by @hacks4pancakes:Lesley’s initial point led to many great responses relating to the value of attending conferences and the process of communicating that value to the powers that be within your organiza
Publish At:2017-03-15 23:30 | Read:3510 | Comments:0 | Tags:Off Topic Conference Infosec networking

Is Fileless Malware Really Fileless?

Over the past few weeks I have been seeing quite a few news articles around fileless malware infecting companies around the world. The article from Ars Technica specifically states that the goal of fileless malware is to reside in memory in order to remain nearly invisible. Besides residing in memory, the second aspect of fileless malware is the usage of wid
Publish At:2017-03-15 05:05 | Read:3105 | Comments:0 | Tags:Off Topic Indicators of Compromise Lan malware

Level up Your Security Training Through Engagement

We all can agree that security training is critical, but have you ever wondered why your organization does not share your same level of excitement when it comes training time?The majority of organizations struggle with getting employees motivated and enthusiastic about training. Many employees look at training as a quarterly or yearly checkbox with the goal
Publish At:2017-03-13 16:15 | Read:2594 | Comments:0 | Tags:Featured Articles Off Topic Engagement security training

Information Security, Cybersecurity, IT Security, Computer Security… What’s the Difference?

Information security, cybersecurity, IT security, and computer security are all terms that we often use interchangeably. I know that I do.I’ve written a lot about those areas for the past several years. I notice that sometimes I switch between the terms in an article simply to avoid repeating the same phrases over and over again in my prose.Very often,
Publish At:2017-03-08 04:10 | Read:3532 | Comments:0 | Tags:Featured Articles Off Topic computer security cybersecurity

Breaching Physical Security and Causing Mayhem with Wireless Signals

Wireless technology is fast replacing wired technology in most industry sectors where some form of communication between devices is required. The recent surge in Internet Of Things (IoT) devices has also pushed wireless communication to be implemented on more devices than ever before.Benefits such as ease of setup, flexibility in device placement, and improv
Publish At:2017-03-08 04:10 | Read:3317 | Comments:0 | Tags:Off Topic security Wired wireless

How Smart Watch Data Exposed a Cheating Half-Marathon Runner

Most security folks are familiar with the threats posed by the Internet of Things (IoT). Indeed, one need only look to what happened to Dyn in October 2016 to grasp the devastating potential of insecure IoT devices. Given this new wave of distributed denial-of-service (DDoS) attacks, as well as the Mirai-infected bots that power them, it’s no wonder 70
Publish At:2017-03-01 17:50 | Read:2864 | Comments:0 | Tags:Off Topic IoT Privacy security

The Top 10 Cities for Information Security Professionals in 2017

A lack of skilled information security professionals poses a threat to most organizations. In Tripwire’s 2016 Security Challenge Survey – Skills Gap, 75 percent of IT security professionals said they don’t have enough skilled personnel to detect and respond to a breach. Almost the same percentage (66 percent) of respondents reported a dearth of t
Publish At:2017-02-24 08:30 | Read:3338 | Comments:0 | Tags:Off Topic Information Security jobs skills gap

One Researcher’s Plan to Broadside Known Windows Tech Support Scammers

2016 saw a lot of different types of scams prey on unsuspecting users. Some achieved greater prevalence than others. One of those was the tech support scam, a ruse where a fraudster calls a victim while impersonating a customer support representative from a well-known technology company. They tell the victim their computer is infected with malware and that t
Publish At:2017-02-13 14:25 | Read:3585 | Comments:0 | Tags:Off Topic fraudster scam tech-support

Security Bulletins on Trial

Have you ever had one of those moments where, in the movie of your life, the actor playing you will voice over with the words, “I should have immediately known I’d come to regret this decision”? Seeing the RSA Call for Speakers suggest originality in the presentation style (via mention of a rock opera) sent us down the path of a mock trial.While
Publish At:2017-02-10 12:25 | Read:2826 | Comments:0 | Tags:Off Topic Bulletin RSA security

P2P Session: Metrics for Managing and Understanding Patch Fatigue

At RSA 2015, I facilitated my first Peer-2-Peer session, “Vulnerability and Risk Scoring: What Ratings Really Mean” in front of full audience. I went into the event not really certain what a Peer-2-Peer was and what I would take away, but I knew I was very interested in discussing vulnerability scoring and metrics with a group of like-minded individuals.Whil
Publish At:2017-02-09 18:00 | Read:2903 | Comments:0 | Tags:Off Topic Metrics peer-2-peer RSA 2017

Autofill FUD

Last week, while browsing various news feeds and websites, I took a scroll through Facebook and saw this video posted from our local morning show, Breakfast Television. They were talking about a Lifehacker post that referenced a github repository belonging to Viljami Kousmanen. The doom and gloom statements of the video are pretty clear evidence of what’s wr
Publish At:2017-02-07 10:45 | Read:3011 | Comments:0 | Tags:Featured Articles Off Topic FUD PCI Compliance Phishing

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud