HackDig : Dig high-quality web security articles for hackers

Do Chromebooks need antivirus protection?

The supervisor handed Jim a Chromebook and said: “Take this home with you and use it to send me updates. We want to minimize the number of visits to the office—anything you can do from home helps keep this place safer. When the pandemic is over, I’d like to have it back in one piece, if possible.” Jim is great at his job, but his reputation with technolo
Publish At:2020-07-01 15:32 | Read:143 | Comments:0 | Tags:Opinion Chromebook chromebook antivirus chromebook security

The best test for an EDR solution is one that works for you

Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the cyber landscape and meet customers’ needs for an effective and simple solution that just works. But finding something that just works means something quite different for every business, depending on their size, security expe
Publish At:2020-05-28 16:55 | Read:230 | Comments:0 | Tags:Awareness Explained Opinion Security world alert fatigue aut

What does it take to become a good reverse engineer?

How much money and effort does it take to become a good reverse engineer? Do you even need to be one? There are no universally acceptable answers to these questions. Software reverse engineering (RE) is not a science but a skillset combined with specific knowledge and backed by a lot of experience. For several years, we have been sharing the RE knowledge tha
Publish At:2020-05-03 08:09 | Read:329 | Comments:0 | Tags:Events Opinion Security conference

Mass surveillance alone will not save us from coronavirus

As the pattern-shattering truth of our new lives drains heavy—as coronavirus rends routines, raids our wellbeing, and whiplashes us between anxiety and fear—we should not look to mass digital surveillance to bring us back to normal. Already, governments have cast vast digital nets. South Koreans are tracked through GPS location history, credit card trans
Publish At:2020-04-15 18:12 | Read:1172 | Comments:0 | Tags:Opinion Apple Austria bluetooth Bluetooth contact tracing Bl

Consumerization: a better way to answer cybersecurity challenges

A version of this article originally appeared in Forbes on February 12, 2020. Consumerization: The specific impact that consumer-originated technologies can have on enterprises. Gartner More and more, enterprises are coming to understand that they need to adopt the agile processes and product strategies of startups in order to compete in today’s m
Publish At:2020-03-25 14:34 | Read:570 | Comments:0 | Tags:Opinion business cyberattacks business cyberthreats consumer

Are our police forces equipped to deal with modern cybercrimes?

“You should have asked for the presence of a digital detective,” Karen said when I told her what happened at the police station. I had accompanied a neighbor, who is a small business owner, that had been hit with ransomware and wanted to file a report. After listening to his story, the police officer at the desk asked if my neighbor had a description of the
Publish At:2020-03-04 16:09 | Read:696 | Comments:0 | Tags:Opinion critical infracstructure cybercrime digital evidence

Why managed service providers (MSP) are critical for business continuity

With the threat landscape becoming more hostile to businesses, small- and medium-sized businesses (SMBs) are often finding it difficult to cope. Hence, they turn to managed service providers (MSPs) for help, not only to keep their businesses going—the concept known as business continuity—but also to offer salve to known pain points that encompass all industr
Publish At:2020-02-24 15:54 | Read:736 | Comments:0 | Tags:Opinion compliance managed service providers MSP MSPs ransom

Securing the MSP: their own worst enemy

We’ve previously discussed threats to managed service providers (MSPs), covering their status as a valuable secondary target to both an assortment of APT groups as well as financially motivated threat groups. The problem with covering new and novel attack vectors, however, is that behind each new vector is typically a system left unpatched, asset manag
Publish At:2020-01-30 16:50 | Read:888 | Comments:0 | Tags:Opinion advanced persistent threat advanced persistent threa

What You Don’t Know About Linux Open Source Could Be Costing to More Than You Think

Guest post by Marc Fisher If you would like to test out Linux before completely switching it as your everyday driver, there are a number of means by which you can do it. Linux was not intended to run on Windows, and Windows was not meant to host Linux. To begin with, and perhaps most of all, Linux is open source computer software. In any event, Linux outperf
Publish At:2019-10-18 04:40 | Read:1164 | Comments:0 | Tags:Articles Opinion Employing Linux open source projects operat

Storing large binary files in git repositories

This is a small update (1 year later) of a great article by Ilmari Kontulainen, first posted on blog.deveo.com. I’ll post the original article in blockquote and my notes in green. Storing large binary files in Git repositories seems to be a bottleneck for many Git users. Because of the decentralized nature of Git, which means every developer has the fu
Publish At:2016-11-19 20:55 | Read:5883 | Comments:0 | Tags:Guides Opinion Reviews git git lfs git-annex large files vcs

How Linux has Advanced Computer Technology and Everyone Wins as a Result

If you were to ask the average person about Linux, it’s likely you would get either a blank stare or a reply about an operating system that a bunch of anti-Microsoft geeks like to use. Both responses are unfortunate misconceptions. Linux has never been more in the mainstream than it is today, and it plays a very important role in advanced computing tec
Publish At:2016-01-23 08:45 | Read:4289 | Comments:0 | Tags:Articles Opinion internet of things linux

Why Computer Information Science Majors Should Use Linux

Guest Post By Ravinder CIS students earn a skill set that applies to a range of lucrative careers in IT. Data architects, software development managers and program managers are among dozens of CIS positions with a mid-career salary that is greater than $120,000. Compared to other disciplines, job prospects are healthy for CIS majors – especially when they co
Publish At:2015-10-01 12:00 | Read:4547 | Comments:0 | Tags:Articles Opinion CIS linux operating systems programming why

Reasons why 2015 will be year for Linux on the desktop

Quick, what’s the first thing you think about when you hear the term “Linux”? If your answer is among the lines of “old-fashion complicated-to-use operating system that’s anything but user-friendly”, you’re clearly thinking of what Linux used to be, and not about what Linux is today. You see, Linux has come a long way since the old-days, when you needed to b
Publish At:2015-03-01 23:05 | Read:6154 | Comments:0 | Tags:Articoli Opinion desktop floss interface linux Microsoft Win

Punishing Students for Gadget Use Will Make Their Tech Etiquette Worse

Image: mattjeacock/GettyAt the start of this year, the President Barack Obama administration made a New Year’s resolution for schools nationwide.  It urged them to drop the “zero tolerance” approach to discipline, joining a growing chorus of critics of  policies that dispense serious punishments for small rule violations.The recom
Publish At:2014-08-09 18:36 | Read:4474 | Comments:0 | Tags:Opinion culture Security tech policy & law

Tools

Tag Cloud