HackDig : Dig high-quality web security articles for hackers

Securing a Remote Workforce: Top Five Things to Focus on For Everyone

Deploying a remote workforce is uncharted territory for some organizations, while others have been perfecting the model for years. Most security programs have different ways to handle their workforce. For on-premise users, which has traditionally used more of castle mentality where you attempt to prevent outsiders from penetrating the network perimeter (simi
Publish At:2020-03-25 09:59 | Read:209 | Comments:0 | Tags:Business Risk Assessment Managed Services Operational Perfor

Hacking a network, using an ‘invisibility cloak’ – Is it that simple?

Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into the target network. Is it possible to hack into a network using a sort of invisibility cloak? The short answer is, YES it is. We came to this conclusion after analyzing an incident after an audit in a Tier-1 bank. The audit r
Publish At:2020-03-12 09:26 | Read:381 | Comments:0 | Tags:Breaking News Hacking information security news it security

Rekt by the REX

The request-to-exit (REX) passive infrared (PIR) sensor. You know the one. Spray canned air or smoke in its face, it becomes disoriented and unlocks the door. Spit a mist of alcohol in its face, it gets a buzz and unlocks the door. The butt of many “jokes” for how easily it provides unauthorized entry, but is this just victim shaming? Courtesy
Publish At:2020-01-09 19:50 | Read:555 | Comments:0 | Tags:Penetration Testing Physical Security Security Testing & Ana

A Message of Support: Coalfire Consultants Charged

If you haven’t been following recent news, two Coalfire employees, Gary DeMercurio and Justin Wynn, were performing a Physical Penetration Test against a Judicial Branch Building, the Dallas County Courthouse in the state of Iowa. The two employees were engaged by the Iowa State Judicial Branch to conduct the Physical Penetration Test, which is an auth
Publish At:2019-11-12 02:50 | Read:577 | Comments:0 | Tags:Physical Security

Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far

Data breaches aren’t slowing down. If anything, they’re set to break last year’s record pace. As noted by 24/7 Wall Street, the 758 breaches reported this year mark nearly a 30 percent increase from 2016. If cybercriminals keep it up, the total number of attacks could break 1,500 by the end of 2017. Top Five Data Breaches of the First Half
Publish At:2017-07-13 23:10 | Read:4413 | Comments:0 | Tags:Data Protection Risk Management Cost of Data Breach Data Bre

How Hotel Cybersecurity Keeps Guests and Data Secure

Hotels need cybersecurity: Although they don’t have the volume of transactions that big box retail stores do, their transactions are generally larger, and their guests have more at stake than just their groceries. But the personal information hotels store is only part of what’s at risk. Breaking Down Hotel Cybersecurity Hospitality organization
Publish At:2017-06-29 09:20 | Read:3657 | Comments:0 | Tags:Data Protection Cybersecurity Data Security Hospitality Indu

Don’t Leave Home Without These Five Travel Security Tips

It’s vacation time for many of us, and that means it’s Christmas for criminals. In their eagerness to experience all the wonders of leisure destinations, travelers are prone to overlooking risks to their physical and digital security. Crooks know this, which is why they target people carrying cameras, sporting backpacks or exhibiting other signs
Publish At:2017-05-25 13:35 | Read:3606 | Comments:0 | Tags:Data Protection Identity & Access Mobile Security Authentica

Does DoD-Level Security Work in the Real World?

I began my career in Information Security working for the Department of Defense, first for a Naval research facility, then Naval Intelligence, and finally with the National Security Agency. Information security for my first assignment meant locking your classified materials in a safe when you left the office at night and making sure the office door was locke
Publish At:2017-02-02 01:45 | Read:4726 | Comments:0 | Tags:Featured Articles IT Security and Data Protection DoD Infose

How to Ensure the Success of a Hot Desking Strategy

The concept of hot desking — the practice of working in a shared office with unassigned desks — has been around for at least a decade. While much has been written about it from a worker’s point of view, employers and IT administrators have had a relatively small voice in the discussion around the latest office craze. Before you even consider whether th
Publish At:2017-01-13 22:00 | Read:5066 | Comments:0 | Tags:Infrastructure Protection Mobile Security Bring-Your-Own-Dev

Subtlety Is the Danger for Cybercrime Security Efforts

Celebrities who appear to be suddenly successful have long been called “overnight sensations.” In reality, most of these instant stars worked for years to perfect their skills before they got their big break. Cyberattacks often follow the same trajectory. They are not always immediately disruptive because they are executed stealthily over long pe
Publish At:2017-01-03 15:10 | Read:3492 | Comments:0 | Tags:Data Protection Fraud Protection Cyber Espionage Cybercrime

Physical Backdoor | Remote Root Vulnerability in HID Door Controllers

If you’ve ever been inside an airport, university campus, hospital, government complex, or office building, you’ve probably seen one of HID’s brand of card readers standing guard over a restricted area. HID is one of the world’s largest manufacturers of access control systems and has become a ubiquitous part of many large companies’ physical security postur
Publish At:2016-11-20 03:20 | Read:5650 | Comments:0 | Tags:Critical Infrastructures Cyber Security ICS Physical Securit

Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock Doors and Set Off Fire Alarms

  A smoke detector that sends you a text alert when your house is on fire seems like a good idea. An internet-connected door lock with a PIN that can be programmed from your smartphone sounds convenient, too. But when a piece of malware can trigger that fire alarm at four in the morning or unlock your front door for a stranger, your “smart home” sud
Publish At:2016-11-20 03:20 | Read:4784 | Comments:0 | Tags:Cyber Security Cyber Security Research IoT Physical Security

Flash mobs the latest threat this holiday season

The holiday season rings in more than just higher sales for retailers. There's also more shoplifting and lower profit margins than the rest of the year, according to a report released today. Plus, this year, there's an extra surprise -- flash mobs.Not the dancing, music-playing, watching-a-couple-get-engaged kind of flash mobs. But the kind of flash mobs
Publish At:2016-10-26 11:15 | Read:2483 | Comments:0 | Tags:Security Cybersecurity Fraud Physical Security

New insulin pump flaws highlights security risks from medical devices

Medical device manufacturer Animas, a subsidiary of Johnson & Johnson, is warning diabetic patients who use its OneTouch Ping insulin pumps about security issues that could allow hackers to deliver unauthorized doses of insulin.The vulnerabilities were discovered by Jay Radcliffe, a security researcher at Rapid7 who is a Type I diabetic and user of t
Publish At:2016-10-04 18:50 | Read:2150 | Comments:0 | Tags:Security Internet of Things Physical Security

How to 'Auto Unlock' your Mac with Apple Watch

Yesterday Apple released the latest version of its desktop OS, macOS Sierra v10.12. The new software features a number of noteworthy enhancements, such as voice-activated Siri commands, support for Apple Pay payments via the Safari browser, a polished Photos app, and many new iOS integrations.But Apple Watch owners will be particularly interested in one
Publish At:2016-09-21 20:20 | Read:3530 | Comments:0 | Tags:MacOS Smartwatches Wearables Security Mobile Security Physic


Share high-quality web security related articles with you:)


Tag Cloud