HackDig : Dig high-quality web security articles for hackers

Social Engineering: Hacking Brains…It’s Easier than Hacking Computers

The audience in the room is weirdly quiet. The contestant is in a small plexiglass booth with nothing but a phone, a laptop computer and some notes. On a set of speakers outside, the booth broadcasts the sounds of a dial tone as a woman on the stage begins to dial a number. It is apparent she is not phoning a friend. The dial tone changes to a ring tone, and
Publish At:2020-07-30 15:36 | Read:94 | Comments:0 | Tags:Featured Articles Security Awareness cyberattack cybersecuri

Are apps stealing company secrets? Smart device privacy concerns for businesses

IntroductionPrivacy often feels like it is something that can be bought, sold and/or simply ignored. So many people use the old and worn argument: “If you have nothing to hide, why worry about privacy…” Privacy, certainly from an individual’s standpoint, has been center stage for a few years now. Debacles such as the Facebook/Cambridge Analytica scanda
Publish At:2020-07-28 17:21 | Read:130 | Comments:0 | Tags:Security Awareness

3 Emerging Innovations in Technology that Will Impact Cyber Security

It goes without saying that innovations and trends in technology have a direct impact on digital security. Just look at what happened with COVID-19. As organizations switched their workforces to remote connectivity, many security teams shifted their attention to deploying enterprise-wide VPNs and partnering with employees to harden their home networks/device
Publish At:2020-07-22 06:51 | Read:90 | Comments:0 | Tags:Featured Articles Security Awareness Foundational Controls i

Cookies: An overview of associated privacy and security risks

IntroductionAnyone who regularly browses the internet must have seen some sort of pop-up or other form of alert about the use of cookies. Some sites even give you the option to accept cookies completely or only partially. So, there is an important question to answer: is it safe to enable cookies?In truth, the use of cookies can be traced back to the da
Publish At:2020-07-07 11:43 | Read:134 | Comments:0 | Tags:Security Awareness

Top 9 free security training tools

Cybersecurity training is one of the best defenses against cyber attacks targeting organizations and individuals alike. Although security training is a tried-and-true defense against cyber attacks and data breaches, security training is not one-size-fits all. Every organization faces unique threats based on their industry, cybersecurity tools and secur
Publish At:2020-07-07 11:43 | Read:144 | Comments:0 | Tags:Security Awareness general security phishing security awaren

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails
Publish At:2020-07-02 15:59 | Read:156 | Comments:0 | Tags:Application Security Endpoint Mobile Security Advanced Malwa

Vishing spikes as workforces go remote: 6 vishing prevention tips anyone can follow

IntroductionWith thousands of teams worldwide being asked to work remotely to help contain the spread of COVID-19, scammers have a fertile ground to prey upon telecommuters. One scam that workers probably weren’t warned about is vishing. This is a type of fraud where adversaries use the phone and social engineering techniques to obtain confidential inf
Publish At:2020-07-01 16:44 | Read:155 | Comments:0 | Tags:Security Awareness

Can 2FA prevent breaches? Lessons learned from the SFO airport watering hole attack

IntroductionIn March 2020, two websites serving customers of San Francisco International Airport were hacked. The websites used first-factor authentication only and the cybercriminals had inserted code that allowed usernames and passwords to be stolen.Passwords are flimsy. A quick phish or hack of an insecure database and your password is gone, stolen
Publish At:2020-06-30 09:51 | Read:147 | Comments:0 | Tags:Security Awareness

Dark web fraud: How-to guides make cybercrime too easy

Introduction to dark web fraudDark web fraud constitutes a global information security problem. The widespread availability of how-to guides providing instructions on how to commit such fraud exacerbates the problem even further.Before examining these how-to guides in detail, we need to explain the meaning of “dark web.” The web includes two main layer
Publish At:2020-06-29 10:41 | Read:152 | Comments:0 | Tags:Security Awareness

How to stay cyber-secure at home with a secure home network

Introduction: Working from home made secureMany companies across the world have been introducing their employees to the concept of working from home. Although the COVID-19 lockdown is beginning to open up in certain areas, what is clear is that home working will continue to be a widespread option for businesses.As a model, remote and home working was i
Publish At:2020-06-15 10:48 | Read:295 | Comments:0 | Tags:Security Awareness

Security awareness training and cyber insurance: Prevention, treatment or both?

Cybersecurity risk management: A business priorityManaging cybersecurity risk should be a priority for all organizations, no matter the size or industry. Bad actors don’t discriminate based on company size or business model, and the ever-growing number of cybersecurity attacks and data breaches is a reminder that no business can afford to ignore this r
Publish At:2020-06-08 12:48 | Read:197 | Comments:0 | Tags:Security Awareness

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift is required to maintain cyber resilience. Cybersecurity, often an afterthought in a strong economy, must not be neglected in responding to shifts in the business landscape. As more companies expand their remote workforce, the number of endpoints with access to corpora
Publish At:2020-06-04 12:22 | Read:301 | Comments:0 | Tags:Data Protection Identity & Access Business Continuity C-Suit

How to scan email headers for phishing and malicious content

IntroductionPhishing emails are one of the most common attack vectors used by cybercriminals. They can be used to deliver a malicious payload or steal user credentials from their target.Spearphishing emails are designed to be more specifically targeted and more believable to their intended victims. By crafting a pretext that is extremely personal to th
Publish At:2020-06-02 13:57 | Read:176 | Comments:0 | Tags:Security Awareness

Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus

With 316 million Americans being asked to stay at home during the COVID-19 pandemic and nearly half of the U.S. population still working from home, video conferencing has suddenly become a critical tool for businesses. In fact, tools for remote work have spiked 84 percent since February, with video conferencing platforms like Webex recently sharing that they
Publish At:2020-06-01 07:09 | Read:255 | Comments:0 | Tags:Threat Research remote workforce Access Management Authentic

Stronger Together — Building Cyber Resilience

In January, the World Economic Forum (WEF) again included cyberattacks as one of the top 10 most likely and significant risks to society in 2020. Less than two months later, ways of working underwent a drastic change due to the global pandemic. With so many employees working remotely and many business functions now in the cloud, organizations are rethinking
Publish At:2020-06-01 07:09 | Read:291 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C


Share high-quality web security related articles with you:)