HackDig : Dig high-quality web security articles for hacker

Halloween: take your cybersecurity to the next level

It’s Halloween, a great time to scare and be scared. These scares can come from horror films, video clips, or worse yet:  a cyberattacker The game against your enemies has begun, and you won’t win without taking your cybersecurity to the next level. These days, cyberthreats can cause huge financial losses—a total of $45 billion in 2018—be it through the loss
Publish At:2019-11-11 22:35 | Read:137 | Comments:0 | Tags:Business Security advanced cybersecurity business halloween

Phishing emails are trying to use cybersecurity against you

Phishing has been around since email has existed. It is an ever-present cyberthreat, and one of the most dangerous. It is estimated that one in every 99 emails is a phishing attack, and that 30% of phishing emails manage to get around default protections. What’s more, over 92% of the malware in the world arrives via email. Apart from malware, phishing emails
Publish At:2019-11-11 22:35 | Read:148 | Comments:0 | Tags:Business Security business email Phishing

Do Americans Think Their Phone Is Listening To Them? (Survey)

Microphones on your devices were created to make life simpler. Not sure what song is playing on the radio? Ask Siri to listen and tell you what the artist is. Need to call your mom but you’re in the middle of cooking dinner? Ask Alexa to make the call for you. The mics in our devices allow us to go hands-free and multitask.  The problem with online microphon
Publish At:2019-11-11 22:35 | Read:120 | Comments:0 | Tags:Mobile Security Panda Security Security Technology cybersecu

800 cyberattacks an hour in the United Kingdom

In 2019, public administrations have suffered a great deal at the hands of cybercriminals. In January, the city hall of Del Rio, Texas, suffered a ransomware attack that forced its employees to carry out their work with pen and paper. This incident was first in a wave of ransomware attacks on public administrations all over the world, which is still affectin
Publish At:2019-10-28 10:35 | Read:477 | Comments:0 | Tags:Business Security advanced cybersecurity business government

Problems with your pc? When to use Panda’s free technical support

Panda Security is well-known for its expertise in detecting, preventing and removing malware infections. But as any PC owner knows, there’s a lot of other things that can go wrong. The sort of problems that take time and expertise to fix. So we’ve made your Panda Dome subscription even better. Now anyone with a valid subscription can get free technical suppo
Publish At:2019-10-28 10:35 | Read:491 | Comments:0 | Tags:Mobile News Panda Security cybersecurity security technology

Halloween Cybersecurity Horror Stories 2019

Horror stories are an important tradition – and it turns out the world of cybersecurity has plenty to tell. Here are three genuine bone-chillers. The zombie phone outbreak With more than 1.5 billion users every month, WhatsApp is by far the world’s most popular messaging service. Available on Android, iOS and other mobile devices, the app connects people acr
Publish At:2019-10-25 04:15 | Read:408 | Comments:0 | Tags:Mobile News News Security cybersecurity tips

Elon Musk Destroys Smartphones For Security Reasons

Elon Musk destroys all his old smartphones: that’s why The real-life Tony Stark is supposedly often replacing and even destroying his smartphone for security reasons, a court filing revealed earlier this month. Elon Musk is currently being sued over a demeaning Tweet he sent targeting a British diver, and details in the statement filed as a part of the
Publish At:2019-10-23 09:15 | Read:509 | Comments:0 | Tags:Mobile News News Security Antivirus cybersecurity news

Tor vs. VPN: What They Do and Which is Better

Online privacy is a growing concern among those surfing the Internet. When surveyed in January of 2019, 53% of online users said they were more concerned about their online privacy this year than they were last year.  With these growing concerns, online users turn to different methods of software such as proxy sites, alternate browsers or private networks. C
Publish At:2019-10-18 21:15 | Read:680 | Comments:0 | Tags:privacy Security cybersecurity Privacy VPN

Signature update for Symantec Endpoint protection crashed many device

Symantec rolled out an intrusion prevention signature update for its Endpoint Protection product that has caused many devices to crash and display a so-called blue screen of death (BSOD). An intrusion prevention signature update for the Endpoint Protection product had a bad impact on the devices, in many cases it caused the devices to crash and display th
Publish At:2019-10-18 10:45 | Read:437 | Comments:0 | Tags:Breaking News Security BSOD hacking news information securit

Private Cloud vs Public Cloud Security Challenges

As a system administrator during the early days of the “cloud revolution” I found the “cloud” metaphor an interesting choice to frame the technology stack. Clouds, in my mind, were “woolly” and hard to pin down as opposed to the omnipresent, always-available things that IT marketers were suggesting cloud services would be. But whilst I wasn’t a fan of the me
Publish At:2019-10-18 10:10 | Read:410 | Comments:0 | Tags:Cloud private cloud public cloud security

[SANS ISC] Quick Malicious VBS Analysis

I published the following diary on isc.sans.edu: “Quick Malicious VBS Analysis“: Let’s have a look at a VBS sample found yesterday. It started as usual with a phishing email that contained a link to a malicious ZIP archive. This technique is more and more common to deliver the first stage via a URL because it reduces the risk to have the
Publish At:2019-10-18 08:20 | Read:696 | Comments:0 | Tags:Malware SANS Internet Storm Center Security SANS ISC

Spectre and Meltdown explained

I found this great article of Anton Gostev about Spectre and Meltdown, so I’m reposting it here : By now, most of you have probably already heard of the biggest disaster in the history of IT – Meltdown and Spectre security vulnerabilities which affect all modern CPUs, from those in desktops and servers, to ones found in smartphones. Unfortunately, ther
Publish At:2019-10-18 04:40 | Read:488 | Comments:0 | Tags:Articles News bug meltdown security spectre

48% of corporate data is now stored on the cloud

The cloud has revolutionized the business world. Thanks to this technology, companies can store an ever increasing amount of data without having to invest in additional hardware. What’s more, thanks to cloud storage, employees can access this data no matter where they are. In fact, for many companies, this constant access to data is their main reason for usi
Publish At:2019-10-17 10:35 | Read:404 | Comments:0 | Tags:Security Cloud

Prying-Eye: the vulnerability that opens the door to industrial espionage

Industrial espionage is a serious problem for companies. And these days, cyberattacks make it easier than ever to access confidential information or patents found inside an organization. If a cyberattacker manages to steal this kind of data, the victim could be seriously damaged. And not just at a reputational level, but also economically speaking:  a stolen
Publish At:2019-10-15 22:35 | Read:275 | Comments:0 | Tags:News Security business vulnerabilities Vulnerability

A week in security (October 7 – 13)

Last week on Malwarebytes Labs, we peered into the possible future of cybersecurity insurance, described the process for securing today’s managed service provider, and provided an in-depth explainer on the business espionage tactic known as “war shipping.” Further, in considering the intersection of National Cybersecurity Awareness Month and National Dom
Publish At:2019-10-14 23:20 | Read:290 | Comments:0 | Tags:A week in security amazon body cams bots chrome cybersecurit


Share high-quality web security related articles with you:)


Tag Cloud