HackDig : Dig high-quality web security articles for hacker

Internet Safety for Kids – Digital Parenting Do’s and Don’ts

Part of being a parent is keeping kids safe, but it’s also about helping kids grow up to become responsible, independent adults. But there’s a bit of friction between these two ideas. How do parents find the right balance between protecting their kids and letting them behave independently? This friction is very apparent when it comes to how parents let
Publish At:2016-06-16 08:00 | Read:3890 | Comments:0 | Tags:Family Protection Security children children internet safety

Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack

Originally published on Family Online Safety Institute.All of the rules and requirements around creating a password can get exhausting. Sometimes you need a symbol other times just a mix of upper and lowercase letters. Why can’t we just make it whatever we want, something easy like abc123? Ideally, the freedom to create simple passwords would be nice but in
Publish At:2015-10-28 13:00 | Read:3114 | Comments:0 | Tags:Security & Privacy online safety password security passwords

Cisco plans to buy security-as-a-service provider OpenDNS

Cisco Systems plans to pay $635 million in cash to buy OpenDNS, a company that leverages the Domain Name System (DNS) to provide security services including Web filtering, threat intelligence and malware and phishing protection.The DNS is a core Internet protocol. It’s used to translate Web addresses that are easy for people to remember, like website names,
Publish At:2015-06-30 17:35 | Read:2186 | Comments:0 | Tags:Security Desktop Security Intrusion Security Compliance Onli

Software applications have on average 24 vulnerabilities inherited from buggy components

Many commercial software companies and enterprise in-house developers are churning out applications that are insecure by design due to the rapid and often uncontrolled use of open-source components.Even worse, these software makers wouldn’t be able to tell which of their applications are affected by a known component flaw even if they wanted to because of po
Publish At:2015-06-16 10:30 | Read:2255 | Comments:0 | Tags:Security Online Safety Security Windows Patches

Adobe fixes Flash Player flaws that could lead to info theft, malware attacks

Adobe Systems fixed 13 security issues in Flash Player that could lead to serious attacks, including remote code execution and information disclosure.Users should upgrade to Flash Player 18.0.0.160 for Windows and Mac, Adobe Flash Player 11.2.202.466 for Linux, or Flash Player 13.0.0.292 if they are on the extended support release channel.Users of Internet E
Publish At:2015-06-10 00:46 | Read:2216 | Comments:0 | Tags:Security Online Safety Security Windows Patches

Researcher warns popular gaming plug-in puts millions of web users at risk from data thieves

A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users’ data from websites they’re logged into, such as their Web mail and social networking accounts.The technology in question, from Unity Technologies, is used by hundreds of thousands of developers to create online games and other
Publish At:2015-06-05 02:25 | Read:2482 | Comments:0 | Tags:Security Online Safety Security Compliance Privacy

New SOHO router security audit uncovers over 60 flaws in 22 models

In yet another testament of the awful state of home router security, a group of security researchers uncovered more than 60 vulnerabilities in 22 router models from different vendors, most of which were distributed by ISPs to customers.The researchers performed the manual security review in preparation for their master’s thesis in IT security at Universidad
Publish At:2015-06-02 23:50 | Read:2628 | Comments:0 | Tags:Security Intrusion Online Safety Security

Tor connections to hidden services could be easy to de-anonymize

Identifying users who access Tor hidden services—websites that are only accessible inside the Tor anonymity network—is easier than de-anonymizing users who use Tor to access regular Internet websites.Security researchers Filipo Valsorda and George Tankersley showed Friday at the Hack in the Box security conference in Amsterdam why Tor connections to hidden s
Publish At:2015-05-29 18:45 | Read:2455 | Comments:0 | Tags:Security Online Safety Security Compliance Privacy

Like routers, most USB modems also vulnerable to drive-by hacking

The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.The flaws could allow attackers to steal or manipulate text messages, contacts, Wi-Fi settings or the DNS (Domain Name System) configuration of
Publish At:2015-05-29 01:55 | Read:2712 | Comments:0 | Tags:Security Intrusion Online Safety Security Malware

E-paper display gives payment cards a changing security code

By embedding an e-paper display in the back of credit and debit cards, payment specialist Oberthur Technologies hopes to make online fraud a lot more difficult. An upcoming test in France will show if the underlying technology can cut it.Using payment cards with an embedded chip makes payments more secure in physical stores, but it’s still relatively easy fo
Publish At:2015-05-20 15:40 | Read:2512 | Comments:0 | Tags:Security Online Safety Security

URL-spoofing bug in Safari could enable phishing attacks

The latest versions of Safari for Mac OS X and iOS are vulnerable to a URL-spoofing exploit that could allow hackers to launch credible phishing attacks.The issue was discovered by security researcher David Leo, who published a proof-of-concept exploit for it. Leo’s demonstration consists of a Web page hosted on his domain that, when opened in Safari, causes
Publish At:2015-05-19 22:50 | Read:2032 | Comments:0 | Tags:Security Malware/Cybercrime Security Online Safety

14 Simple Steps for Writing Rock-Solid Passwords

Because your privacy is only as safe as your weakest password.Your online privacy depends on the strength of your passwords.Ok, so maybe that’s a bit of an exaggeration, but let’s face it. The strength of your passwords is important. If it wasn’t, why would so many people be interested in hacking them!Passwords keep your private stuff private. They make sure
Publish At:2015-05-15 00:10 | Read:4840 | Comments:0 | Tags:Mobile Security Online Privacy Online Safety PC security ant

Anonymous-tied DDoS botnet shows insecure routers are legion

Tens of thousands of home routers have been infected with malware, and are being used by hackers to launch distributed denial-of-service (DDoS) attacks, including by the hacktivist group Anonymous.The router-based botnet was discovered by Web security firm Incapsula while investigating a series of DDoS attacks against dozens of its customers that have been g
Publish At:2015-05-12 21:45 | Read:2491 | Comments:0 | Tags:Security Intrusion Online Safety Security Malware DDOS

Visitors to top porn sites hit by malvertising attack

In the latest attack involving malicious advertisements, hackers managed to launch Flash Player exploits against the visitors of several popular porn websites.It’s not clear how many users were impacted, but the affected websites have over 250 million monthly visits combined, according to researchers from Malwarebytes who spotted and analyzed the attack.The
Publish At:2015-05-08 16:40 | Read:2327 | Comments:0 | Tags:Security Online Safety Security Malware

What the Heck are Zero-Day Attacks? (And 3 Ways to Avoid Them)

If you look for the term zero-day attack in your home dictionary, you probably won’t find it.Go ahead and check…I’ll wait.You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Fo
Publish At:2015-05-07 07:35 | Read:4157 | Comments:0 | Tags:Online Privacy Online Safety PC security advanced real-time

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud