HackDig : Dig high-quality web security articles for hacker

[SANS ISC] Keep an Eye on Remote Access to Mailboxes

I published the following diary on isc.sans.edu: “Generating PCAP Files from YAML“: BEC or “Business Email Compromize” is a trending thread for a while. The idea is simple: a corporate mailbox (usually from a C-level member) is compromized to send legitimate emails to other employees or partners. That’s the very first st
Publish At:2019-11-12 03:20 | Read:77 | Comments:0 | Tags:SANS Internet Storm Center Security BEC Email SANS ISC

Cyber Security Month Wrap-Up

This month was the “Cyber Security Month” and I had the idea to post a security tip on Twitter for the first day. Don’t ask me why. Then, I wrote a second one and decided to tweet something every day. We are now at the end of the day and I’m publishing a recap of all tweets… Cybersecurity should not be taken into account
Publish At:2019-11-12 03:20 | Read:31 | Comments:0 | Tags:Security

[SANS ISC] Microsoft Apps Diverted from Their Main Use

I published the following diary on isc.sans.edu: “Microsoft Apps Diverted from Their Main Use“: This week, the CERT.eu organized its yearly conference in Brussels. Across many interesting presentations, one of them covered what they called the “cat’n’mouse” game that Blue and Red teams are playing continuously. When the Blue team h
Publish At:2019-11-12 03:20 | Read:67 | Comments:0 | Tags:SANS Internet Storm Center Security Microsoft Office SANS IS

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more so than your Average Joe. Whether a reporter is trying to crowd-source information without revealing their story or operating in a country where freedom of the press is a pipe dream, cybersecurity plays an important role for any journ
Publish At:2019-11-11 23:20 | Read:33 | Comments:0 | Tags:How-tos communication data eavesdropping encrypted journalis

Halloween: take your cybersecurity to the next level

It’s Halloween, a great time to scare and be scared. These scares can come from horror films, video clips, or worse yet:  a cyberattacker The game against your enemies has begun, and you won’t win without taking your cybersecurity to the next level. These days, cyberthreats can cause huge financial losses—a total of $45 billion in 2018—be it through the loss
Publish At:2019-11-11 22:35 | Read:28 | Comments:0 | Tags:Business Security advanced cybersecurity business halloween

Phishing emails are trying to use cybersecurity against you

Phishing has been around since email has existed. It is an ever-present cyberthreat, and one of the most dangerous. It is estimated that one in every 99 emails is a phishing attack, and that 30% of phishing emails manage to get around default protections. What’s more, over 92% of the malware in the world arrives via email. Apart from malware, phishing emails
Publish At:2019-11-11 22:35 | Read:59 | Comments:0 | Tags:Business Security business email Phishing

Do Americans Think Their Phone Is Listening To Them? (Survey)

Microphones on your devices were created to make life simpler. Not sure what song is playing on the radio? Ask Siri to listen and tell you what the artist is. Need to call your mom but you’re in the middle of cooking dinner? Ask Alexa to make the call for you. The mics in our devices allow us to go hands-free and multitask.  The problem with online microphon
Publish At:2019-11-11 22:35 | Read:6 | Comments:0 | Tags:Mobile Security Panda Security Security Technology cybersecu

800 cyberattacks an hour in the United Kingdom

In 2019, public administrations have suffered a great deal at the hands of cybercriminals. In January, the city hall of Del Rio, Texas, suffered a ransomware attack that forced its employees to carry out their work with pen and paper. This incident was first in a wave of ransomware attacks on public administrations all over the world, which is still affectin
Publish At:2019-10-28 10:35 | Read:239 | Comments:0 | Tags:Business Security advanced cybersecurity business government

Problems with your pc? When to use Panda’s free technical support

Panda Security is well-known for its expertise in detecting, preventing and removing malware infections. But as any PC owner knows, there’s a lot of other things that can go wrong. The sort of problems that take time and expertise to fix. So we’ve made your Panda Dome subscription even better. Now anyone with a valid subscription can get free technical suppo
Publish At:2019-10-28 10:35 | Read:253 | Comments:0 | Tags:Mobile News Panda Security cybersecurity security technology

Halloween Cybersecurity Horror Stories 2019

Horror stories are an important tradition – and it turns out the world of cybersecurity has plenty to tell. Here are three genuine bone-chillers. The zombie phone outbreak With more than 1.5 billion users every month, WhatsApp is by far the world’s most popular messaging service. Available on Android, iOS and other mobile devices, the app connects people acr
Publish At:2019-10-25 04:15 | Read:209 | Comments:0 | Tags:Mobile News News Security cybersecurity tips

Elon Musk Destroys Smartphones For Security Reasons

Elon Musk destroys all his old smartphones: that’s why The real-life Tony Stark is supposedly often replacing and even destroying his smartphone for security reasons, a court filing revealed earlier this month. Elon Musk is currently being sued over a demeaning Tweet he sent targeting a British diver, and details in the statement filed as a part of the
Publish At:2019-10-23 09:15 | Read:271 | Comments:0 | Tags:Mobile News News Security Antivirus cybersecurity news

Tor vs. VPN: What They Do and Which is Better

Online privacy is a growing concern among those surfing the Internet. When surveyed in January of 2019, 53% of online users said they were more concerned about their online privacy this year than they were last year.  With these growing concerns, online users turn to different methods of software such as proxy sites, alternate browsers or private networks. C
Publish At:2019-10-18 21:15 | Read:455 | Comments:0 | Tags:privacy Security cybersecurity Privacy VPN

Signature update for Symantec Endpoint protection crashed many device

Symantec rolled out an intrusion prevention signature update for its Endpoint Protection product that has caused many devices to crash and display a so-called blue screen of death (BSOD). An intrusion prevention signature update for the Endpoint Protection product had a bad impact on the devices, in many cases it caused the devices to crash and display th
Publish At:2019-10-18 10:45 | Read:195 | Comments:0 | Tags:Breaking News Security BSOD hacking news information securit

Private Cloud vs Public Cloud Security Challenges

As a system administrator during the early days of the “cloud revolution” I found the “cloud” metaphor an interesting choice to frame the technology stack. Clouds, in my mind, were “woolly” and hard to pin down as opposed to the omnipresent, always-available things that IT marketers were suggesting cloud services would be. But whilst I wasn’t a fan of the me
Publish At:2019-10-18 10:10 | Read:131 | Comments:0 | Tags:Cloud private cloud public cloud security

[SANS ISC] Quick Malicious VBS Analysis

I published the following diary on isc.sans.edu: “Quick Malicious VBS Analysis“: Let’s have a look at a VBS sample found yesterday. It started as usual with a phishing email that contained a link to a malicious ZIP archive. This technique is more and more common to deliver the first stage via a URL because it reduces the risk to have the
Publish At:2019-10-18 08:20 | Read:362 | Comments:0 | Tags:Malware SANS Internet Storm Center Security SANS ISC


Share high-quality web security related articles with you:)


Tag Cloud