HackDig : Dig high-quality web security articles for hackers

It’s Not Too Late: Take Back Control of Your Cybersecurity Now

I have a confession: Talking about technology can bore the heck out of me. Bot master, data encryption, system-specific policies — there are times when hearing someone ramble on about this stuff makes my eyes roll into the back of my head. One minute I’m listening intently and the next I’m picturing a guy straight out of the Dilbert comic series
Publish At:2017-04-03 11:00 | Read:4187 | Comments:0 | Tags:CISO Risk Management Chief Information Security Officer (CIS

Security Slice: Big Backdoor Problems

Apple joined backdoor bootkit club last month with Thunderstrike. This malware can spread through Apple’s Thunderbolt interface and create a permanent backdoor to the device. The infection can even withstand hard drive reformats and OS reinstallations.Apple is expected to patch the bootkit in OS X 10.10.2, but what steps can hardware vendors take to address
Publish At:2015-02-20 04:10 | Read:4231 | Comments:0 | Tags:Security Slice Apple Podcasts security

Security Slice: Password Mismanagement

According to IBM Trusteer, cybercriminals are beginning to target password managers.  Security researchers discovered a modified version of the Citadel Trojan, which launches a keylogger when infected users open Password Safe or KeePass, two popular password manager programs.Will other malware campaigns spring up to target password managers?Listen to our lat
Publish At:2014-12-01 09:20 | Read:3520 | Comments:0 | Tags:Security Slice Infosec passwords Podcasts

Threatpost News Wrap, October 3, 2014

Dennis Fisher and Mike Mimoso talk about the Bash Shellshock bug nightmare and the BadUSB code release.Download: digital_underground_169.mp3Music by Chris Gonsalves
Publish At:2014-10-03 18:10 | Read:3536 | Comments:0 | Tags:Podcasts Vulnerabilities Web Security BadUSB Bash Bash bug D

Bash Exploit Reported, First Round of Patches Incomplete

The urgency to patch systems against the Bash zero-day vulnerability has been cranked to 10 after reports of an exploit in the wild have been made public by AusCERT, the Computer Emergency Response Team of Australia.This seems to reflect a similar finding posted by a researcher who goes by the handle Yinette who found a malware sample that points to a bot be
Publish At:2014-09-25 20:20 | Read:4659 | Comments:0 | Tags:Malware Podcasts Vulnerabilities Web Security Bash Bash botn

David Jacoby on Hacking His Home

Dennis Fisher talks with David Jacoby of Kaspersky Lab about the research he did on the security of electronics gear in his home, including his smart TV, game console and storage devices, and what the vendors need to do to respond.​http://threatpost.com/files/2014/09/digital_underground_168.mp3Download: digital_underground_168.mp3Music by Chris Gonsalves
Publish At:2014-09-24 23:40 | Read:3785 | Comments:0 | Tags:Hacks Podcasts Vulnerabilities David Jacoby Dennis Fisher In

Threatpost News Wrap, September 19, 2014

Dennis Fisher and Mike Mimoso talk abut the crazy news of the last couple of weeks, the Apple privacy and Apple Pay announcements, the details of the Home Depot breach and the end of the Microsoft Trustworthy Computing unit.http://threatpost.com/files/2014/09/digital_underground_167.mp3Download: digital_underground_167.mp3Music by Chris Gonsalves
Publish At:2014-09-19 19:40 | Read:4368 | Comments:0 | Tags:Apple Data Breaches Microsoft Mobile Security Podcasts Web S

Rich Mogull on Apple Pay

Dennis Fisher talks with Rich Mogull about the new iPhone 6, the security and privacy of Apple Pay and whether there’s another company that could put together a similar payment system.http://threatpost.com/files/2014/09/digital_underground_166.mp3Download: digital_underground_166.mp3Music by Chris Gonsalves
Publish At:2014-09-18 23:00 | Read:3981 | Comments:0 | Tags:Apple Mobile Security Podcasts apple Apple Pay apple securit

Gary McGraw on the IEEE Center for Secure Design

Dennis Fisher talks with Gary McGraw of Cigital about the IEEE’s new Center for Secure Design program, the difficulty of defeating large classes of bugs and the collaborative effort it will take to solve the software security problem.http://threatpost.com/files/2014/09/digital_underground_164.mp3Music by Chris Gonsalves 
Publish At:2014-09-03 10:30 | Read:3497 | Comments:0 | Tags:Cryptography Podcasts Vulnerabilities Web Security Center fo

Black Hat and DEF CON Wrap Up

Dennis Fisher and Mike Mimoso look back on the news from the last week in Las Vegas at Black Hat and DEF CON, including the Blackphone rooting, the Computrace research and the more upbeat mood at the conferences this year.http://threatpost.com/files/2014/08/digital_underground_162.mp3Download: digital_underground_162.mp3Music by Chris GonsalvesImage via Blac
Publish At:2014-08-12 16:10 | Read:3586 | Comments:0 | Tags:Hacks Podcasts Vulnerabilities Black Hat Black Hat 2014 Blac

Tools