HackDig : Dig high-quality web security articles for hacker

Critical DoS messaging flaw fixed in December Android update

byJohn E DunnFor anyone lucky enough to get them, Android’s December 2019 updates arrived this week, patching a small list of system and Qualcomm flaws across the operating system’s two patch levels.In Google’s estimation, at the top of the urgent list on the 2019-12-01 patch level (see below for explanation) is CVE-2019-2232, a critical flaw affecting Andro
Publish At:2019-12-05 12:35 | Read:149 | Comments:0 | Tags:Android Google Linux Mobile Operating Systems Security threa

National Veterinary Associates catches dose of ransomware

byDanny BradburyRansomware attacks don’t discriminate. They are just as happy targeting those with four legs as those with two.Anonymous sources told cybersecurity reporter Brian Krebs this week that National Veterinary Associates (NVA) has fallen victim to a ransomware attack that has affected hundreds of hospitals.NVA describes itself as one of the l
Publish At:2019-11-26 12:35 | Read:227 | Comments:0 | Tags:Data loss Malware Ransomware Security threats cyberattack ma

Parents say creep hacked their baby monitor to tell toddler they ‘love’ her

byLisa VaasAnother mouthbreather with nothing better to do than hack a baby monitor and broadcast their “love” for a 3-year-old has apparently struck again.This time, it happened to a family in Seattle.According to local broadcaster King 5, a couple who asked to be identified only as Jo and John said that their daughter, Jaden, was spied on by a stranger who
Publish At:2019-11-26 12:35 | Read:191 | Comments:0 | Tags:IoT Privacy Security threats baby monitor baby monitors FRED

Adobe fixes 46 critical bugs in patchfest

byDanny BradburyAdobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.The lion’s share of the patches, which the company flagged on 11 October, came in a single advisory covering Acrobat and Acrobat Reader on the Windows and macOS platforms, extending back to the Classic 2015 versions.There were
Publish At:2019-10-17 06:05 | Read:239 | Comments:0 | Tags:Adobe Organisations Security threats Acrobat Acrobat Reader

Two charged with tech-support scamming the elderly for $10m

byLisa VaasTwo US people have been charged with the alleged tech-support scumbaggery of spooking old people by shoving scary “Your computer has a virus, call us!!!!” pop-ups in their faces and then fleecing them for services they didn’t need and never got.The band of crooks did this to about 7,500 victims, most of them elderly, shaking them down for more tha
Publish At:2019-09-23 06:05 | Read:491 | Comments:0 | Tags:Law & order Security threats elderly fake tech support tech

Understanding External Security Threats

Cyber security is now a board-level risk across the entire spread of industry. However, it is a broad subject with a large number of unknowns, and some might say there’s no real way to ever discover or quantify those unknowns.Unfortunately, this can result in cyber security being poorly understood and boards vulnerable to being misled by ‘snake-oil’ so
Publish At:2015-10-07 13:20 | Read:3765 | Comments:0 | Tags:Featured Articles Risk-Based Security for Executives Defense

Are Weak Passwords Putting Your Small Business at Risk?

A weak password is like a cheap lock; it’s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not just the realm of casual Internet users; they are also an issue that is worryingly common in business, especially in small companies where passwords are regularly shared between colleagues.According to a re
Publish At:2015-01-23 03:10 | Read:2933 | Comments:0 | Tags:Recommended Security & Privacy password security Security Th

The biggest threat to your SLAs – DDoS Attacks (Part I)

It is no secret that Hosting Providers live and die by the Service Level Agreements (SLAs) and uptime guarantees they offer to their customers.  Organizations select providers, and remain loyal when SLA thresholds are continuously met.  Hosting Providers are fighting an up-hill battle in striving to meet these aggressive guarantees.  There is a certain level
Publish At:2015-01-21 20:20 | Read:2413 | Comments:0 | Tags:DDoS Security Threats Stephen Gates DDoS Attacks Hosting Pro

Looking for a Cheap Service for DDoS Penetration Testing? How Does $2.99 Sound to You?

Lizard Squad, the hacking group that takes credit for attacking the Sony PlayStation Network and the Microsoft Xbox network back in December, now wants to be your commercial provider of a sort of “penetration testing” toolkit. CNN recently reported that anyone can rent the Lizard Squad tool called Lizard Stresser for as little as $2.99 to launch
Publish At:2015-01-20 00:35 | Read:2273 | Comments:0 | Tags:DDoS Linda Musthaler Security Threats cybersecurity data pro

The Hacker Group Anonymous as Do-Gooder?

We are usually writing about the hacker group Anonymous in terms of the harmful attacks its members launch against business and government websites. But now the BBC is reporting that Anonymous is claiming credit for knocking a terrorist recruiting website offline. Anonymous is declaring war on jihadist websites following the recent terrorist attacks in Paris
Publish At:2015-01-14 12:35 | Read:3481 | Comments:0 | Tags:DDoS Linda Musthaler Security Threats Anonymous DDoS Attacks

The Web as Equalizer in Cyber Terrorism

When the World Wide Web rose to prominence two decades ago, it was called the great equalizer. By having a Web presence, a small company could look as impressive as a large company when it came to courting prospective customers and employees. Individuals could access information that previously had been locked away in hard copy sources only. Consumers could
Publish At:2015-01-12 16:50 | Read:3813 | Comments:0 | Tags:DDoS Governance Risk and Compliance Linda Musthaler Network

Can we still trust email?

You’d better be extra vigilant as you read through your business emails these days. Cyber attackers are growing more tenacious in their use of corporate email systems to plant malware on networks. Here are a couple of proof points. Symantec recently posted an article on its Security Response blog about attackers behind malicious spam campaigns turning
Publish At:2014-12-30 13:05 | Read:3031 | Comments:0 | Tags:Linda Musthaler Security Management Security Threats Uncateg

The DDoS myth about the firewall and the IPS

It is about time we put an end to the myths that often come up when choosing a network security solution to protect against DDoS.  Namely: Myth #1: An IPS can protect against Distributed Denial of Service (DDoS) attacks Myth #2: A Firewall or a Next Generation Firewall can be a first line of defense against DDoS Do you think that the major of the financial
Publish At:2014-12-16 18:15 | Read:2248 | Comments:0 | Tags:DDoS Network Security Nirav Shah Security Threats targeted a

DDoS Attack left “Sweden not Working”

The recent DDoS attacks impacting Swedish cable, Internet and mobile service provider, TeliaSonera is another grim reminder of the impact a DDoS attack can have not only on the business itself, but the 5 million subscribers that were left without service, and left “Sweden not working”, as TeliaSonera’s CEO Johan Dennelind has stated publically. T
Publish At:2014-12-12 19:45 | Read:3244 | Comments:0 | Tags:Bipin Mistry DDoS Network Security Security Threats Amplific

“It’s not you, it’s the Internet” – Time to break up with DDoS

Lizard Squad said it best in the recent Sony PlayStation DDoS attacks, rocking the online gaming industry, and leaving players denied from logging into the gaming community. Fact: DDoS attack tools are easy to come by, and cheap to execute, and the motivations for targeting victims are endless. Myth: “I’m not susceptible to DDoS attacks, because I’m not a B
Publish At:2014-12-08 21:15 | Read:7393 | Comments:0 | Tags:Bipin Mistry Data Protection DDoS Security Threats DDoS atta

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud