HackDig : Dig high-quality web security articles for hacker

Interesting List of Windows Processes Killed by Malicious Software

Just a quick blog post about an interesting sample that I found today. Usually, modern pieces of malware implement anti-debugging and anti-VM techniques. They perform some checks against the target and when a positive result is found, they silently exit… Such checks might be testing the screen resolution, the activity of a connected user, the presence
Publish At:2017-09-07 05:50 | Read:219 | Comments:0 | Tags:Malware Security Process windows

In Vulnerability Management, Process is King

Posted February 18, 2015   Morey HaberYou have a vulnerability scanner, but where’s your process?Most organizations are rightly concerned about possible vulnerabilities in their systems, applications, networked devices, and other digital assets and infrastructure components. Identifying vulnerabilities is indeed important, and most security pr
Publish At:2015-02-19 02:10 | Read:1237 | Comments:0 | Tags:Vulnerability Management analysis discovery process remediat

How to Enhance Security With Persuasive Technology

Security breaches continue to lead in technology news, with the targeted victims ranging from personal consumer storage to major enterprises and government organizations. All too often, the response from the public — and enterprise management — is to blame the human failings of the victims. While it is true that people, both as employees and consumers, large
Publish At:2014-09-18 22:10 | Read:1054 | Comments:0 | Tags:CISO Risk Management Cybersecurity information-security IT S

The Role of Human Error in Successful Security Attacks

All humans make mistakes. One of the most intriguing findings from IBM’s “2014 Cyber Security Intelligence Index” is that 95 percent of all security incidents involve human error. Many of these are successful security attacks from external attackers who prey on human weakness in order to lure insiders within organizations to unwittingly pro
Publish At:2014-09-03 09:40 | Read:1042 | Comments:0 | Tags:CISO Risk Management attacks Cyber Security human error IBM

Software Development Process – courtesy of 9GAG

Software Development Process – courtesy of 9GAG This is the most accurate description I’ve come across. The fairies, from left to right, are the Wicked Witch, the Tooth Fairy, Tinker Bell, and Fairy Hedgehog. You will notice that the Security Fairy hasn’t turned up yet. Alw
Publish At:2014-08-27 18:20 | Read:1399 | Comments:0 | Tags:Kevin Townsend's opinions fairies process software developme

Linux Terminal: Reptyr attach a running process to a new terminal

If, like me, you work on terminals connected via ssh to remote computer/server you are probably used to tmux and screen and so it’s not a problem if you have to close your session, as you’ll be able to easily re-connect when you need it, but sometimes you could forget about using one of these utility. Started a long-running process over ssh, but
Publish At:2014-08-10 17:14 | Read:1572 | Comments:0 | Tags:Guides Pills cli linux pid process reptyr ssh terminal

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud