HackDig : Dig high-quality web security articles for hacker

A Modern Hypervisor as a Basis for a Sandbox

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code. At Kaspersky Lab, we have several sandboxes, including an Android sandbox. In this article, we will look at just one of
Publish At:2017-09-19 11:40 | Read:616 | Comments:0 | Tags:Publications Antivirus Technologies Security technology Targ

Accelerate Response With Orchestration

Organizations today are battling three compounding challenges: complex cyberattacks that shift as they unfold, complicated technology environments and a fast-growing skills gap. As a result, technologies and processes that enable a dynamic, fast and orchestrated response are becoming vital. IBM Resilient has many enterprise deployments around the world spa
Publish At:2017-07-28 03:30 | Read:463 | Comments:0 | Tags:Incident Response IBM IBM Security Incident Response (IR) Re

What Interests Children Online

Today’s children and teenagers are integrated into cyberspace so tightly that discussions on the outright prohibition of using devices with Internet connectivity are nonsensical. It is more reasonable to teach children how to behave themselves correctly online and lend support by protecting them against undesirable content. To solve these problems, man
Publish At:2017-06-01 10:55 | Read:1297 | Comments:0 | Tags:Analysis Featured Publications Parental control Security tec

False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results

In pursuit of a high cyberthreat detection rate, the some developers of cybersecurity solutions neglect the subject matter of false positives, and unfairly so. Indeed, this is a very inconvenient matter that some developers tend to overlook (or try to solve with questionable methods) until there is a serious incident that could paralyze the work of their cus
Publish At:2017-05-13 11:15 | Read:867 | Comments:0 | Tags:Blog Opinions Antivirus Technologies Antivirus Testing false

The security is still secure

Recently WikiLeaks published a report that, among other things, claims to disclose tools and tactics employed by a state-sponsored organization to break into users’ computers and circumvent installed security solutions. The list of compromised security products includes dozens of vendors and relates to the whole cybersecurity industry. The published re
Publish At:2017-04-16 11:45 | Read:766 | Comments:0 | Tags:Blog Opinions Antivirus Technologies Antivirus Vulnerabiliti

Features of secure OS realization

There are generally accepted principles that developers of all secure operating systems strive to apply, but there can be completely different approaches to implementing these principles. A secure operating system can be developed from an existing OS by improving certain characteristics that are the cause (or the consequence) of that operating system’s
Publish At:2017-02-09 18:25 | Read:952 | Comments:0 | Tags:Blog Security policies secure OS Security technology

Machine learning versus spam

Machine learning methods are often presented by developers of security solutions as a silver bullet, or a magic catch-all technology that will protect users from a huge range of threats. But just how justified are these claims? Unless explanations are provided as to where and how exactly these technologies are used, these assertions appear to be little more
Publish At:2017-01-20 05:50 | Read:1376 | Comments:0 | Tags:Blog Opinions machine learning Security technology Spam

Loop of Confidence

With the arrival of Apple Pay and Samsung Pay in Russia, many are wondering just how secure these payment systems are, and how popular they are likely to become. A number of experts have commented on this, basing their opinions on the common stereotypes of Android being insecure and the attacks which currently take place on wireless payments. In our opinion
Publish At:2016-11-12 08:35 | Read:1388 | Comments:0 | Tags:Blog Research Apple Credit Cards Electronic Payments NFC Sec

Small users in a big network

Children use the Internet for schoolwork, socializing, watching films and cartoons, playing games and much more. But, as we all know, browsing the web can be an unsafe business. In order to control their children’s online activity many parents use specialized software – so-called parental control. This software is usually capable of controlling the amo
Publish At:2016-05-30 19:25 | Read:1807 | Comments:0 | Tags:Blog Research Parental control Security technology

Cybersecurity effectiveness will be measured by risk reduction, not technology deployment

Many businesses today begin securing their data with a checkbox. That is, a chief security or information officer is told, “We need to secure X,” thus the goal becomes, “Find a solution to tick the ‘X’ security checkbox.” This is how we measure the security of our information today, by itemizing the technologies we’ve deployed across an organization. Unfor
Publish At:2016-01-08 19:20 | Read:1372 | Comments:0 | Tags:Security enterprise security mobile security risk reduction

Infosec Influencers: An Interview with Bruce Schneier

This week, as part of our new “Infosec Influencer” series, I had the pleasure of sitting down with Bruce Schneier, an internationally renowned security technologist and one of The State of Security’s Top Influencers in Security You Should Be Following in 2015. He has written 12 books, including Liars and Outliers: Enabling the Trust Society
Publish At:2015-07-17 09:25 | Read:1109 | Comments:0 | Tags:Featured Articles Off Topic Bruce Schneier cryptography Info

Security Technology a Top Focus for CISOs

Chief information security officers (CISOs) and other security leaders are tasked with protecting the enterprise against a multitude of threats, including attacks from sophisticated and determined cybercriminals. They must do so in an environment of interlinked revolutions in technology such as the cloud, mobile devices and big data analytics. It should come
Publish At:2014-12-17 17:40 | Read:1465 | Comments:0 | Tags:CISO Bring-Your-Own-Device (BYOD) Chief Information Security

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud