HackDig : Dig high-quality web security articles for hacker

The Enemy Within: Identifying Insider Threats in Your Organization

Security professionals and managers are increasingly concerned that the leading information security risk to organizations comes from within. But despite the sinister overtones of this problem, insider threats are associated more with accidents and oversights than malicious actors. The danger is amplified by shortfalls in training and expertise, and the ch
Publish At:2017-06-22 11:35 | Read:132 | Comments:0 | Tags:Identity & Access Risk Management Critical Data Data Protect

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:178 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

Nigerian phishing: Industrial companies under attack

In late 2016, the Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) reported on phishing attacks that were primarily targeting industrial companies from the metallurgy, electric power, construction, engineering and other sectors. As further research demonstrated, this was just part of a bigger story that began mu
Publish At:2017-06-15 13:30 | Read:190 | Comments:0 | Tags:Featured Research industrial software Nigerian Scam Phishing

Corporate email addresses receive four times more malware than personal ones

Cyber-attacks cost companies millions of euros each year. A high price to pay which, according to a study conducted by Google’s Research Team, is not only due to the growing sophistication of the strategies and tools used by cyber-crooks, but also to the huge number of threats in circulation. Researchers examined over 1 billion email exchanges via Gmai
Publish At:2017-06-12 23:00 | Read:242 | Comments:0 | Tags:Security Adaptive Defense 360 companies Malware Phishing Spa

Two Tickets as Bait

Over the previous weekend, social networks were hit with a wave of posts that falsely claimed that major airlines were giving away tickets for free. Users from all over the world became involved in this: they published posts that mentioned Emirates, Air France, Aeroflot, S7 Airline, Eva Air, Turkish Airlines, Air Asia, Air India, and other companies. We cann
Publish At:2017-06-10 09:25 | Read:222 | Comments:0 | Tags:Phishing Fraud Social Engineering Social networks

Five Tips to Stay Safe on Social Media While Traveling

Oversharing your travel plans can put you, your colleagues, your corporate data systems, your property and even your loved ones at risk. Similarly, announcing to the world that your home is vacant obviously increases the odds of a break-in, so what happens to your corporate laptop or personal devices containing corporate data that you leave at home? Furthe
Publish At:2017-06-07 21:40 | Read:296 | Comments:0 | Tags:Risk Management Identity Theft Phishing Security Awareness S

All Hands to the Pump (and Dump)

All Hands to the Pump (and Dump) Posted by David Harley on April 19, 2017.A few years ago, even before I started working directly with vendors in the security industry, ‘Pump and Dump’ scams were a major nuisance. Here’s a description from a paper Andrew Lee and I wro
Publish At:2017-06-06 19:57 | Read:201 | Comments:0 | Tags:David Harley phishing QSMG scams securities stocks

How do you know if the leaks are real?

Is the Media Able to See the Difference Between Fake, Real and Tampered Leaks? Since President Donald Trump became POTUS, he has been accusing reputable sources of information such as BBC, NY Times, NBC News and CNN for being ‘fake news’. However, every single person, who has ever had to deal with these outlets, especially with publications such as BBC
Publish At:2017-06-06 01:15 | Read:211 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers Phishing

Relying on Data to Mitigate the Risk of WordPress Website Hijacking

One of the most common methods cybercriminals use to deliver phishing and malware to unsuspecting users is compromising legitimate websites, such as those hosted on WordPress, to house their own malicious content for free. The URLs of compromised sites used for phishing attacks reach users through spam emails, allowing security professionals to keep track of
Publish At:2017-05-30 22:30 | Read:260 | Comments:0 | Tags:Fraud Protection Risk Management Software & App Vulnerabilit

The Most Common Social Engineering Attacks

Many years ago, one of the world’s most popular hacker Kevin Mitnick explained in his book “The Art of Deception” the power of social engineering techniques, today we are aware that social engineering can be combined with hacking to power insidious attacks.Let’s consider for example social media and mobile platforms; they are co
Publish At:2017-05-30 22:05 | Read:319 | Comments:0 | Tags:Phishing

How to Recognize Phishing Emails

Section 1. About phishingPeople all over the world get phishing emails on a daily basis. Email inboxes are full of suspicious requests to confirm bank transactions, respond to social media messages, reply to soldiers serving in war zones, and receive inheritances from unknown relatives residing overseas.Phishing is an illegitimate fraudulent practice c
Publish At:2017-05-30 22:05 | Read:245 | Comments:0 | Tags:Phishing

Fresh Phish. (So Many Puns, So Little Time.)

Today’s phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected! Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails. I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly mimics the invoice emails from a fairly sig
Publish At:2017-05-23 12:10 | Read:216 | Comments:0 | Tags:Threats apps attachments browsing files humans Isolation Mal

The Electronic signature technology provider DocuSign suffered a data breach

Hackers broke into the system of the technology provider DocuSign and accessed customers email addresses. The experts warn of possible spear phishing attacks. The Electronic signature technology provider DocuSign suffered a data breach, hackers have stolen email addresses from one of its servers. On Monday the company informed its customers of the data breac
Publish At:2017-05-17 22:20 | Read:405 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach data breach DocuSign H

The Doctor Is In: Building a Security Immune System for Health Care

If you’re a member of my generation living in the U.S., you may remember the Bubble Boy. His story grabbed the national consciousness and was made into a TV movie featuring John Travolta. It was a sad tale of how a boy with a severe immune deficiency was forced to live his life inside a plastic bubble to protect him from pathogens. A single breach of t
Publish At:2017-05-14 01:10 | Read:272 | Comments:0 | Tags:Data Protection Health Care Health Care Industry Health Care

Sophisticated Phishing Attack Targets Google Docs Users

On Wednesday afternoon, social media flooded with news of a new Phishing attack targeting users of Google Docs. The attack was quick, smart on getting the victim to grant permissions Google Docs by scattering to the victim’s contacts.Fortunately, the attack did not last long, thanks to the efforts of thoughtful users, Google, and Cloudflare.Offic
Publish At:2017-05-14 00:45 | Read:168 | Comments:0 | Tags:Phishing


Share high-quality web security related articles with you:)


Tag Cloud