HackDig : Dig high-quality web security articles for hacker

Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning. Deepfakes aside, we need to be aware that several machine learning models, including state-of
Publish At:2020-03-27 09:35 | Read:195 | Comments:0 | Tags:Artificial Intelligence Advanced Threats Artificial Intellig

Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

In recent years, remote work has become a growing trend. In 2018, however, only 3.6 percent of Americans worked entirely remotely. Due to changes in the global climate, many employers have shifted their workforces to remote work if their jobs can support it. With the sudden expansion of work-from-home and remote-work practices, chief information security off
Publish At:2020-03-25 15:51 | Read:144 | Comments:0 | Tags:Advanced Threats Identity & Access Security Intelligence & A

Free Cyber Safety Resources during COVID-19

Whether you are reading this from somewhere in the United States or overseas, chances are you are doing it from the comfort of your home. Not because you chose to but because you were asked to do so in order to prevent Coronavirus disease 2019 (COVID-19) from spreading any further.If you are a parent, working remotely with your kids at home, you are probably
Publish At:2020-03-24 09:22 | Read:104 | Comments:0 | Tags:Security Awareness COVID-19 Cyber Safety

COVID-19 Scam Roundup – Week of 3/16/20

Malicious actors are increasingly leveraging COVID-19 as a theme for new digital fraud attacks. In February 2020, for instance, Action Fraud received 21 reports of fraud relating to the coronavirus. This number of reports more than doubled to 46 between March 1 and March 13, 2020. Between March 14 and March 18, 2020, the United Kingdom’s national fraud
Publish At:2020-03-23 06:49 | Read:98 | Comments:0 | Tags:Security Awareness COVID-19 email scam

7 Spring Cleaning Tasks to Improve Data Security

This year, March 19 ushered in spring in the Northern Hemisphere — the first time since 1896 that the season has started so early. So why not take advantage of the season’s early arrival to do some spring cleaning, not only of your physical space, but of your data and systems, too? Digital spring cleaning can make your life easier and dramatically impr
Publish At:2020-03-20 10:40 | Read:152 | Comments:0 | Tags:Data Protection Mobile Security Application Security Cloud C

4 Principles That Should Define Your Evolving Security Operations Model

I recently had the opportunity to speak at a security conference where I presented the operating models that an organization can embrace when managing cyberthreats and the guiding principles associated with them. It was a great chance to share some of my experiences with the greater community and foster intellectual curiosity around an increasingly important
Publish At:2020-03-20 09:20 | Read:130 | Comments:0 | Tags:CISO Risk Management Security Services Cloud Security Cybert

How CIAM Addresses the Challenges of Consumer Identity Management

Consumer identities are at the heart of brand engagements today. Digital interactions are a routine part of our lives and touchpoints for consumers have reached astounding heights. Nearly 60 percent of the world is digitally connected and more than half of the world’s population will be using social media by the middle of 2020, according to We Are Soci
Publish At:2020-03-19 08:08 | Read:178 | Comments:0 | Tags:Identity & Access Security Services Business Continuity Comp

2020 Tax Fraud Trends: How to Protect Yourself at Home and Work

The tax season deadline in the U.S. is April 15, 2020, and that means scammers are officially on the prowl for unsuspecting tax fraud victims. Attackers are utilizing both time-tested and new techniques to collect tax information and personal data from victims and target individual and corporate accounts. No one is immune from tax season risks, and most of u
Publish At:2020-03-17 10:37 | Read:213 | Comments:0 | Tags:Fraud Protection Bank Fraud Email Fraud Fraud Schemes Identi

9 Strategies for Retaining Women in Cybersecurity and STEM in 2020

In March 2017, (ISC)2 published the results of its annual “Global Information Security Workforce Study,” a survey of 19,641 people working in the cybersecurity field across 170 different countries. Of the thousands of people surveyed, only 11 percent were women in cybersecurity. That statistic, coupled with the report’s conclusion that by 2
Publish At:2020-03-06 11:10 | Read:166 | Comments:0 | Tags:CISO Career Cybersecurity Jobs Risk Management Security Awar

How Human Security Investments Created a Global Culture of Accountability at ADP

Practice doesn’t necessarily make perfect, but it can lead to improvement. Quality practice is key in matters of human security, and the right quantity of practice can also make a significant difference when it comes to shifting mindsets and behavior. “Scientists believe that expert-level performance is primarily the result of expert-level practi
Publish At:2020-03-04 13:39 | Read:219 | Comments:0 | Tags:CISO Artificial Intelligence (AI) Chief Information Security

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful. In 2018 and 2019, attackers used phishing as an entry point for one-third of all attacks tracked by IBM X-Force Incident Response and Intelligence Services (IRIS) — the most commonly used of all known a
Publish At:2020-03-03 07:18 | Read:192 | Comments:0 | Tags:Threat Intelligence Business Email Compromise (BEC) Data Bre

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. The purpose of threat modeling is to provide defenders with a systematic analysis of the probable attacker’s profile, the most likely attack vectors and the assets most desired by an attacker. Ef
Publish At:2020-02-27 09:41 | Read:368 | Comments:0 | Tags:Application Security Security Intelligence & Analytics Appli

Introducing Lock and Code: a Malwarebytes Labs podcast

Intrepid Labs readers might be happy to know that we’re stepping into territory long-requested and desired: we’re launching a podcast. Malwarebytes researchers and reporters are on the front lines of cybercrime, delivering both fast-breaking news and thoughtful features on our blog to raise awareness and help users stay safe and private online
Publish At:2020-02-25 13:50 | Read:346 | Comments:0 | Tags:Podcast cybercrime cybersecurity awareness lock and code loc

A Road Map for Better Government Cybersecurity From North Dakota

Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, “Every student, every school, cyber-educated.” It’s the first I’ve heard about an objective this bold, and it comes from a state that gets little media exposure: North Dakota. The small Great Plains state has establishe
Publish At:2020-02-25 08:22 | Read:785 | Comments:0 | Tags:Government Artificial Intelligence (AI) Cybersecurity Jobs C

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

2019 was a tough year for the overall cybersecurity of state and local governments and municipal institutions. If you follow security news, there were times when not a week would go by without word of how the latest municipal cyberattacks impeded or even halted day-to-day operations. This stream of recent hacking incidents targeting government and municipal
Publish At:2020-02-21 13:22 | Read:332 | Comments:0 | Tags:Data Protection Government Cyberattacks Data Breach Healthca

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud