HackDig : Dig high-quality web security articles for hackers

Web skimming with Google Analytics

Web skimming is a common class of attacks generally aimed at online shoppers. The principle is quite simple: malicious code is injected into the compromised site, which collects and sends user-entered data to a cybercriminal resource. If the attack is successful, the cybercriminals gain access to shoppers’ payment information. To make the data flow to
Publish At:2020-06-22 06:07 | Read:104 | Comments:0 | Tags:Featured Publications Security Websites Website Hacks

Do cybercriminals play cyber games during quarantine?

Thanks to the coronavirus pandemic, the role of the Internet in our lives has undergone changes, including irreversible ones. Some of these changes are definitely for the better, some are not very good, but almost all of them in some way affect digital security issues. We decided to take a closer look at the changes around us through the prism of information
Publish At:2020-06-17 06:26 | Read:131 | Comments:0 | Tags:Featured Publications Gaming malware Malware Statistics Onli

Explicit content and cyberthreats: 2019 report

‘Stay at home’ is the new motto for 2020 and it has entailed many changes to our daily lives, most importantly, in terms of our digital content consumption. With users opting to entertain themselves online, malicious activity has grown. Over the past two years we have reviewed how adult content has been used to spread malware and abuse users̵
Publish At:2020-06-15 06:58 | Read:139 | Comments:0 | Tags:Featured Publications Adware Malware Malware Statistics Mobi

Kids on the Web in 2020

Technology is what is saving us from a complete change in the way of life in a world of a raging pandemic. It keeps the educational process going, relieves the shortage of human communication and helps us to live life as fully as possible given the isolation and social distancing. Many adults, and children too, have come to realize that the computer is not j
Publish At:2020-06-03 06:33 | Read:195 | Comments:0 | Tags:Featured Publications Parental control Security technology

Verizon’s 2020 DBIR

Verizon’s 2020 DBIR is out, you can download a copy or peruse their publication online. Kaspersky was a contributor once again, and we are happy to provide generalized incident data from our unique and objective research. We have contributed to this project and others like it for years now. This year’s ~120 page report analyses data from us and
Publish At:2020-05-24 07:11 | Read:212 | Comments:0 | Tags:Publications Cybercrime Data theft Malware Statistics Ransom

Financial Cyberthreats in 2019

Methodology Financial cyberthreats are malicious programs that target users of services such as online banking, e-money, and cryptocurrency, or that attempt to gain access to financial organizations and their infrastructure. These threats are usually accompanied by spam and phishing activities, with malicious users creating fake financial-themed pages and em
Publish At:2020-04-16 07:00 | Read:589 | Comments:0 | Tags:Featured Publications Apple MacOS ATM Electronic Payments Fi

Black Friday Alert 2019: Net Shopping Bag of Threats

Every year, Kaspersky releases an annual Black Friday alert to highlight how fraudsters may capitalize on increased levels of online shopping at this time of year when many brands are offering their customers appealing discounts. In the rush to get a big discount or, even more panic-inducing, a limited time offer, many shoppers lose all sense of vigilance. C
Publish At:2019-11-22 18:05 | Read:847 | Comments:0 | Tags:Publications Electronic Payments Malware Statistics Phishing

5G security and privacy for smart cities

The 5G telecommunications revolution is imminent. It is the next generation of cellular network, making use of the existing 4G LTE in addition to opening up the millimeter wave band. 5G will be able to welcome more network-connected devices and increase speeds considerably for users. It will serve as the foundation for advanced services, including: 8k strea
Publish At:2019-11-22 18:05 | Read:989 | Comments:0 | Tags:Publications Cyber espionage DDoS-attacks infrastructure Int

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

In 2018, the video game industry became one of the most lucrative in the world, generating $43.4 billion in revenue within the United States alone. When we consider that video game licenses are only a fraction of the total market, it becomes clear just how important the industry is compared to the movie and music industries, for example. Moreover, conservati
Publish At:2019-11-12 01:05 | Read:1066 | Comments:0 | Tags:Featured Publications Electronic Payments Fraud Online Games

Data collectors

Who owns data owns the world. And with the Internet taking over much of our daily lives, it has become far easier and faster to receive, collect, and analyze data. The average user cannot even imagine how much data gets collected on them. Besides technical information (for example, about a smartphone) harvested by a manufacturer to patch vulnerabilities, com
Publish At:2019-10-23 06:05 | Read:1209 | Comments:0 | Tags:Featured Publications advertising networks Data Protection F

A glimpse into the present state of security in robotics

 Download full report (PDF) The world of today continues its progress toward higher digitalization and mobility. From developments in the Internet of Things (IoT) through augmented reality to Industry 4.0, whichrely on stronger automation and use of robots, all of these bring more efficiency to production processes and improves user experience across th
Publish At:2019-10-14 06:20 | Read:1089 | Comments:0 | Tags:Featured Publications Internet of Things Security technology

Managed Detection and Response analytics report, H1 2019

 Download full report (PDF) Introduction This report contains the results of the Managed Detection and Response (MDR) service (brand name – Kaspersky Managed Protection). The MDR service provides managed threat hunting and initial incident response. Threat hunting is the practice of iteratively searching through data collected from sensors (refere
Publish At:2019-10-08 06:20 | Read:1859 | Comments:0 | Tags:Featured Publications Antivirus Technologies Industrial thre

The State of Stalkerware in 2019

Introduction and methodology Six months ago, we created a special alert that notifies users about commercial spyware (stalkerware) products installed on their phones. This report examines the use of stalkerware and the number of users affected by this software in the first eight months of 2019. Сonsumer surveillance technology has evolved rapidly in recent y
Publish At:2019-10-02 06:20 | Read:2541 | Comments:0 | Tags:Featured Publications Cyberbullying Cybercrime Malware Stati

Incident Response report 2018

 Download full report (PDF) Introduction This report covers our team’s incident response practices for the year 2018. We have thoroughly analyzed all the service requests, customer conversations and incident response deliverables to provide you an overview in numbers. The report includes statistics on how companies reveal data breaches and comprom
Publish At:2019-09-19 18:20 | Read:1082 | Comments:0 | Tags:Featured Publications APT DDoS-attacks Financial malware Ind

This is what our summer’s like

For the second summer straight, we cover the children’s interests during the period when they have enough leisure to give themselves full time to their hobbies. Modern children are active users of the internet, so most of their interests find reflection in their online activities, which are the subject of our today’s review. Statistics collection
Publish At:2019-09-19 18:20 | Read:728 | Comments:0 | Tags:Featured Publications Parental control Security technology

Announce

Share high-quality web security related articles with you:)

Tools