HackDig : Dig high-quality web security articles for hackers

How to Secure Yourself From Phishing Attacks in Times of COVID-19

Introduction The year 2020 just had just started and we got struck with global pandemic COVID-19 caused by the novel coronavirus. With this global fear, one more unwanted danger came along but in the virtual world of cyberspace. And that is phishing attacks. From scam artists to blackhat hackers or threat actors started leveraging the situation and psycho
Publish At:2020-05-03 07:50 | Read:253 | Comments:0 | Tags:Knowledge-base News Security Advisory phishing attacks phish

Cybersecurity trends to look out for in 2020

The rise of cybersecurity threats in 2019 has made corporations across the globe, increasingly aware of the importance of security measures needed to combat these threats. There are a plethora of questions from a cybersecurity perspective that need answering. What are the tech trends and associated risks? What will be the new strategy of attackers and what i
Publish At:2020-01-13 01:50 | Read:937 | Comments:0 | Tags:News Security Advisory cybersecurity security advisory

How to Select a Penetration Testing Provider Perfect for Your Business?

Penetration Testing has become one of the best ways to combat cybersecurity risks. With a sudden growth in cyber breaches taking place across the globe, security-aware businesses are looking at ways to secure their database in the most efficient way possible. Thus, the demand for experts in penetration testing has grown exponentially and is showing no signs
Publish At:2020-01-08 01:50 | Read:609 | Comments:0 | Tags:News Security Advisory pen testing as a service penetration

WPA2 Protocol Vulnerability – Intercepting Password on Wireless Device

Overview The WPA2 Protocol vulnerability allows attacker to decrypt the network traffic from the vulnerable device and it also allow to view the critical information, injecting the packets/data from the vulnerable devices. The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks and the researcher who found this vulnerability is no
Publish At:2017-10-21 16:40 | Read:4185 | Comments:0 | Tags:Security Advisory WPA2 Protocol Vulnerability Vulnerability


Share high-quality web security related articles with you:)