HackDig : Dig high-quality web security articles for hackers

US Bans WeChat, TikTok Citing Privacy, National Security

The U.S. will ban the downloads of the Chinese apps TikTok and WeChat on Sunday, with a total ban on the use of the latter, citing national security and data privacy concerns.A total ban on the use of TikTok will follow on Nov. 12, but Commerce Secretary Wilbur Ross said early Friday on Fox Business Network that access to that app may be possible if certain
Publish At:2020-09-18 11:18 | Read:113 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Risk Management Mobile &

Twitter Taking Steps to Protect Election-Related Accounts

Twitter announced this week that it’s taking steps to protect high-profile accounts during the upcoming election in the United States.Twitter is reaching out, via an in-app notification, to the owners of accounts associated with government officials, presidential campaigns, political parties, candidates, major news outlets and political journalists.The socia
Publish At:2020-09-18 11:17 | Read:64 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Compliance Identity & Access

Google Ups Malware Protection for 'Advanced Protection' Users

Google this week announced improved malware protection capabilities for all users who are enrolled in its Advanced Protection Program.Aimed at providing high-risk users such as politicians and their staff, business executives, journalists, and activists with an additional layer of protection for their accounts, the Advanced Protection Program was launched in
Publish At:2020-09-17 10:00 | Read:79 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Ri

Risk Management: How Security Can Learn to Do the Math

Risk management is an important element in using data to get ahead of cybersecurity risks before they happen. The costs of protecting an enterprise of any size against cyber attacks continue to rise. Once a business truly understands the consequences of an incident, its leaders must decide how to manage the risk. They can choose to accept, reduce or av
Publish At:2020-09-16 21:17 | Read:89 | Comments:0 | Tags:CISO Risk Management Security Services Cybersecurity Financi

NSA Publishes Guidance on UEFI Secure Boot Customization

The United States National Security Agency (NSA) this week published guidance on how the Unified Extensible Firmware Interface (UEFI) Secure Boot feature can be customized to fit an organization’s needs.A replacement for the legacy Basic Input Output System (BIOS), UEFI is used across multiple architectures and provides broader customization options, higher
Publish At:2020-09-16 08:27 | Read:153 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Risk Management Manage

Chinese Hackers Using Publicly Available Resources in Attacks on U.S. Government

Threat actors affiliated with the Chinese Ministry of State Security (MSS) continue to target U.S. government agencies, the Cybersecurity and Infrastructure Security Agency (CISA) says in a new alert.Published with contribution from the FBI, the alert presents some of the tactics, techniques, and procedures (TTPs) that the Chinese state-sponsored hackers are
Publish At:2020-09-15 12:54 | Read:135 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Risk Ma

TikTok Rejects Microsoft Offer, Oracle Sole Remaining Bidder

American tech giant Microsoft said Sunday its offer to buy TikTok was rejected, leaving Oracle as the sole remaining bidder ahead of the imminent deadline for the Chinese-owned video app to sell or shut down its US operations.TikTok is at the center of a diplomatic storm between Washington and Beijing, and President Donald Trump has set Americans a mid-Septe
Publish At:2020-09-14 05:37 | Read:124 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Compliance Risk

ICS Vendors Release Advisories for CodeMeter Vulnerabilities

Several major industrial control system (ICS) vendors have released security advisories in response to the recently disclosed vulnerabilities affecting the CodeMeter licensing and DRM solution made by Germany-based Wibu-Systems.CodeMeter provides license management capabilities and it’s designed to protect software against piracy and reverse engineering. It’
Publish At:2020-09-11 15:02 | Read:129 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Risk Management Vulnerabilit

Why your security risk management program should include legacy systems

IntroductionThe aim of business is to be profitable — and as we all know, investing in new systems, devices, and technology costs money that may otherwise be logged as profit. As a result of this, many organizations opt to keep their legacy systems around because they work and it would simply be too expensive to buy or source a replacement system that
Publish At:2020-09-01 16:10 | Read:182 | Comments:0 | Tags:Risk Management security

Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked

Researchers have once again demonstrated that many printers can be hacked remotely, by hijacking 28,000 devices and instructing them to print out a printer security guide.The research was conducted by security experts at CyberNews, who claim to have identified more than 800,000 printers that were accessible over the internet and had network printing features
Publish At:2020-08-27 15:32 | Read:184 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Risk Management Vuln

Supply Chain Risk Management – What You Need to Know to Build a Successful SCRM Program

There is a story from years ago about a warehouse network of computers that was separated from the main network. Those machines were running older OSes. But since they weren’t connected to the company network, didn’t hold company data, and only ran the warehouse machines, they were deemed secure.One day, the sysadmin noticed that all of those com
Publish At:2020-08-26 01:23 | Read:167 | Comments:0 | Tags:Featured Articles Risk Management Secure Supply Chain supply

CISA Details Strategy for Secure 5G Deployment

The U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) has published details on its strategy for the secure deployment of 5G networks within the country.The fifth-generation (5G) of wireless technology is expected to bring numerous benefits, including higher data rates, low latency, and high network capacity,
Publish At:2020-08-25 15:55 | Read:186 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Risk M

Cybersecurity: An All-Encompassing Organizational Responsibility

Organizations Must Establish a Culture of Rresilience With Strategies That Are Independent, Measurable and UsableToday, the digital world is propelling connectivity and data growth to new heights. While their associated capabilities and information can give organizations a competitive advantage, these ever-evolving technologies can also expose critical infra
Publish At:2020-08-25 12:42 | Read:230 | Comments:0 | Tags:INDUSTRY INSIGHTS SCADA / ICS Risk Management security cyber

How Can Enterprises Protect Personally Identifiable Information?

With data breaches often appearing in the news, customers and enterprise leaders alike may be concerned that the enterprise isn’t doing enough to protect customers’ personally identifiable infomation (PII). As today’s chaotic economy makes for a hungry threat landscape, what methods can the enterprise apply to better protect the increased
Publish At:2020-08-24 10:26 | Read:312 | Comments:0 | Tags:Data Protection Identity & Access Risk Management Data Breac

TikTok Says to Sue Over Trump Crackdown

Video app TikTok said Saturday it will challenge in court a Trump administration crackdown on the popular Chinese-owned platform, which Washington accuses of being a national security threat.As tensions soar between the world's two biggest economies, President Donald Trump signed an executive order on August 6 giving Americans 45 days to stop doing business
Publish At:2020-08-24 09:19 | Read:239 | Comments:0 | Tags:NEWS & INDUSTRY Risk Management Management & Strateg


Tag Cloud