HackDig : Dig high-quality web security articles for hacker

Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge

Even as the technology deployed by both cyberattackers and cybersecurity defenders grows more sophisticated and powerful, the central role of the human factor remains critical. The most effective way to break into a computer network is to trick a legitimate user into opening the door to let you in. The techniques used to achieve this trickery are known as so
Publish At:2017-10-22 05:00 | Read:2452 | Comments:0 | Tags:Fraud Protection Fraud Prevention Phishing Phishing Attacks

Frost & Sullivan Report Highlights Rise in Phishing Attacks

Have you ever unknowingly opened and responded to a phishing email or fallen victim to a phishing attack? A recent report by Frost & Sullivan titled “You’ve Been Phished, Again! Solution: Eliminate the Click-It Temptation,” discussed just how susceptible we all are to these fraudulent attacks and what can be done to avoid them. How Do P
Publish At:2017-09-12 13:50 | Read:2481 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Cognitive Secu

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Gone are the days of the Nigerian prince promising fortune to unsuspecting email recipients. Attackers have stepped up their phishing game and evolved their tactics to entice employees to click links or open attachments, preying on the opportunity to spread persistent malware or compromise credentials. These threat actors relentlessly target employees — both
Publish At:2017-08-24 16:50 | Read:2545 | Comments:0 | Tags:Fraud Protection Security Intelligence & Analytics Employee

Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security

Layered schemes are used in most information security strategies, and it is essential to establish a similar approach to protecting the organization from unwanted email. In fact, spam and phishing are some of the biggest problems IT security managers face today. According to LinkedIn’s “2017 Cybersecurity Trends Report,” phishing attacks ar
Publish At:2017-08-17 19:00 | Read:2323 | Comments:0 | Tags:Fraud Protection Risk Management Email Fraud Prevention Phis

Relying on Data to Mitigate the Risk of WordPress Website Hijacking

One of the most common methods cybercriminals use to deliver phishing and malware to unsuspecting users is compromising legitimate websites, such as those hosted on WordPress, to house their own malicious content for free. The URLs of compromised sites used for phishing attacks reach users through spam emails, allowing security professionals to keep track of
Publish At:2017-05-30 22:30 | Read:3931 | Comments:0 | Tags:Fraud Protection Risk Management Software & App Vulnerabilit

Gone Phishing: Don’t Fall for the Bait

What is phishing and why is it called that? That’s a pretty easy one, really: The act of stealing someone’s credentials is sort of like fishing in water. There’s a group of targets, bait that is known to be of interest to them and a pretty good chance of at least catching something, even if it’s not the original meal you were after.
Publish At:2017-05-02 19:00 | Read:2667 | Comments:0 | Tags:Fraud Protection Credentials Theft login credentials Passwor

Phishing Attacks Collect 70 Percent of Credentials Within the First Hour

Have you ever been phished? Would you know the difference between a phishing website and your bank’s legitimate website? We all hope we could identify the difference between our financial institution’s domain and a phony one. However, statistics indicate that 30 percent of phishing emails are opened. To make matters worse, more than 400,000 frau
Publish At:2017-04-17 20:15 | Read:2603 | Comments:0 | Tags:Fraud Protection Financial Phishing Fraud Fraud Prevention I

Operation Pawn Storm on Continued Marathon, Attacking Targets Now with Advance Infrastructure

Operation Pawn Storm allegedly run by hackers backed by the Russian Government still advancing their infrastructure a great deal, the group is believed to using advanced tactics to hit the targets. Trend Micro revealed that the group have introduced all new infrastructure and is “Zeroing in” onto the targets that include NATO
Publish At:2015-04-20 12:35 | Read:3185 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Hacking Intelligence


Share high-quality web security related articles with you:)


Tag Cloud