HackDig : Dig high-quality web security articles for hacker

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the c
Publish At:2017-08-03 12:45 | Read:241 | Comments:0 | Tags:Innovation cybersecurity detection intelligence management p

Cybersecurity Doesn’t Just Happen, You Have to Get a Round Tuit (We Have One For You)

It’s Monday. On the West Coast, Black Hat is over and if you traveled, you should be home. If you didn’t travel, it’s still Monday and there are things to be done. And August starts tomorrow – so you might be thinking, “Bah, let’s get through August and then I’ll refocus.” Not so fast. This is a round tuit. Y
Publish At:2017-07-31 14:15 | Read:278 | Comments:0 | Tags:Threats bbc breaches data priorities research round tuit Sec

Cyberheists and the Most Common Tactics for Carrying Them Out

As we explained in our “Survival Guide for Million-Dollar Cyberattacks”, cyberheists are evolving at breakneck speed. For financial institutions, this is obviously a major concern. These institutions are coming up against ever more sophisticated malware and very well coordinated, and, in short, completely professionalized targeted attacks. In fact, according
Publish At:2017-07-28 14:20 | Read:313 | Comments:0 | Tags:Security b2b banking cyberheists

DNS Attacks Could Cost Your Company $2 Million a Year

The DNS (Domain Name System) is the keystone of the proper functioning of the internet. Each time you access your email or your Facebook, you’re using it. So when a DNS server is under attack and inaccessible, every website that it supports also becomes unavailable. DNS attacks have already had a major impact in the functioning of companies, and it turns out
Publish At:2017-07-27 11:30 | Read:309 | Comments:0 | Tags:Security b2b cybersecurity dns

Lazy BlackHat Presentations Crawler

Many infosec professionals joined Las Vegas to attend the BlackHat security conference. As I’m not part of those lucky people so I’m waiting for the presentations (they are published when the talk is completed). But I don’t have time to lose sitting in front of my computer and pressing F5… So let’s crawl them automatically…
Publish At:2017-07-27 09:45 | Read:292 | Comments:0 | Tags:Event Security BlackHat

Four Things You Should Know About the GDPR

May 25, 2018 will mark a “before and after” in the field of data protection legislation. That day will see Europe’s GDPR (General Data Protection Regulation) come into effect. Although the date of its entry into force was 25 May 2016, when the two-year transition period stipulated by the legislation is up, any company that violates the requirements of this r
Publish At:2017-07-26 17:05 | Read:178 | Comments:0 | Tags:Security b2b data protection gdpr Privacy

CrowdStrike presented the fastest and largest cybersecurity search engine

CrowdStrike Inc., the leader in cloud-delivered endpoint protection, announced the fastest and largest cybersecurity search engine. Security firm CrowdStrike, the leader in cloud-delivered endpoint protection, announced a significant improvement of its Falcon platform that has been integrated with a powerful cybersecurity search engine. According to the com
Publish At:2017-07-26 07:20 | Read:198 | Comments:0 | Tags:Breaking News Hacking Security CrowdStrike cybersecurity sea

EU digital chief Andrus Ansip announced its plans to improve cyber security in EU

EU digital chief Andrus Ansip announced new measures to improve EU cyber security, including new offices to certify cybersecurity of technology products. The EU digital chief Andrus Ansip announced his plan to set up a new office to certify the level of cyber security implemented in technology products. The European Commission vice-president is thinking of a
Publish At:2017-07-24 18:32 | Read:128 | Comments:0 | Tags:Breaking News Security Cybersecurity EU EU digital chief And

New Debian 9.1 release includes 26 security fixes for 55 packages

The Debian Project announced the Debian 9.1 GNU/Linux, a version that brings numerous updates and addresses many security issues. The Debian Project announced the new Debian 9.1 release that includes 26 security fixes. The list of fixed problems includes the Heimdal Kerberos man-in-the-middle vulnerability, a 20 years-old vulnerability in Kerberos that was p
Publish At:2017-07-24 18:31 | Read:198 | Comments:0 | Tags:Breaking News Security Debian 9.1 LINUX security

5 Tech Things To Do Before Your Next Vacation

In almost every family, there is a little security routine that people do before they leave their property. In many cases, it involves checking out if all the windows are closed and if the lights and the oven are not on. Even if you have a security system setup, you want to make sure your windows are closed in case there is rain; no one enjoys seeing ruined
Publish At:2017-07-20 13:25 | Read:105 | Comments:0 | Tags:Security

Protecting your email against phishing attacks

How can you protect yourself against phishing? Email is one of the most popular ways people stay in touch, for both at work and at home. One report found that there were 205 billion emails sent every day in 2015 – and this is expected to rise to 246 billion by 2019. Much of our day-to-day business is conducted online now – take banking for instance. Many ban
Publish At:2017-07-19 18:55 | Read:164 | Comments:0 | Tags:Mobile News Security cybersecurity Phishing

Ransomware is Not the Only Ransom Attack

So far in 2017, ransomware has been the star cyberattack, with two back-to-back incidents in recent months that were unprecedented in their size and scope. This malicious software encrypts files from computers and blocks them until a ransom is received, usually in the form of bitcoin, an untraceable virtual cryptocoin. The now famous Wannacry attack affected
Publish At:2017-07-19 00:30 | Read:178 | Comments:0 | Tags:Security DDoS doxware Ransomware

CISCO issues security patches for nine serious RCEs in SNMP subsystem in IOS and IOS XE

Cisco has fixed nine serious remote code execution flaws in the SNMP subsystem running in all the releases of IOS and IOS XE software. The tech giant publicly disclosed the vulnerability on June 29 and provided workarounds, not it is notifying customers about the availability of security patches. The nine issues, that have been tracked with codes from CVE-20
Publish At:2017-07-15 13:05 | Read:303 | Comments:0 | Tags:Breaking News Hacking Security CISCO Cisco IOS Software iOS

How encryption can help startups in protecting their data

The deployment of encryption in modern businesses does not only guarantee hundred percent security but it also reduces the surface of attack. Data protection has become the top objective for many businesses in the world today. Especially after the ransomware incident, hacked credit card databases and the Apple leak. Businesses are scratching their heads in a
Publish At:2017-07-15 13:05 | Read:312 | Comments:0 | Tags:Security Cybersecurity encryption

SAP Security Notes fixes SAP POS flaw potentially affecting 500 billion installations

SAP has released its SAP Security Notes for July 2017 that includes 23 patches, the most severe is a SAP POS flaw that affects about 500 billion installs SAP has released its Security Notes for July that includes 23 patches with the majority of them rated medium. The most severe issue is a high-risk DoS vulnerability that affects SAP Point of Sale, a solutio
Publish At:2017-07-14 00:15 | Read:204 | Comments:0 | Tags:Breaking News Hacking Security SAP POS SAP Security Notes


Share high-quality web security related articles with you:)


Tag Cloud