HackDig : Dig high-quality web security articles for hackers

Top 8 world crises exploited by cybercriminals and lessons learned

IntroductionCrises can vary immensely, be it in terms of the specific nature of each situation or the impacts that may be limited to a specific group — or even an event such as the COVID-19, which is essentially affecting all countries around the world.Even with this huge variety in types of crises, the fact is that they all share a common point: their
Publish At:2020-08-10 09:51 | Read:143 | Comments:0 | Tags:Security Awareness exploit

4 reasons why you should include current events in your phishing simulation program

IntroductionOne of the dirtiest aspects of phishing campaigns in the wild is that they will take advantage of anything happening in the world today to make their job easier. Most notably and timely are the phishing campaigns taking advantage of the latest COVID-19 events to entice users to click on a malicious URL or to download an infected file attach
Publish At:2020-08-05 10:20 | Read:77 | Comments:0 | Tags:Security Awareness

Work-from-home network traffic spikes: Are your employees vulnerable?

A shift to work-from-home cultureSocial distancing during the COVID-19 pandemic has forced employees to work from home, and many businesses were unprepared to provide cybersecurity in this new environment. Some had just 24 hours to make the switch, which means security measures likely fell through the cracks. Even after states relax their mandates and
Publish At:2020-08-04 15:05 | Read:85 | Comments:0 | Tags:Security Awareness

Social Engineering: Hacking Brains…It’s Easier than Hacking Computers

The audience in the room is weirdly quiet. The contestant is in a small plexiglass booth with nothing but a phone, a laptop computer and some notes. On a set of speakers outside, the booth broadcasts the sounds of a dial tone as a woman on the stage begins to dial a number. It is apparent she is not phoning a friend. The dial tone changes to a ring tone, and
Publish At:2020-07-30 15:36 | Read:111 | Comments:0 | Tags:Featured Articles Security Awareness cyberattack cybersecuri

Are apps stealing company secrets? Smart device privacy concerns for businesses

IntroductionPrivacy often feels like it is something that can be bought, sold and/or simply ignored. So many people use the old and worn argument: “If you have nothing to hide, why worry about privacy…” Privacy, certainly from an individual’s standpoint, has been center stage for a few years now. Debacles such as the Facebook/Cambridge Analytica scanda
Publish At:2020-07-28 17:21 | Read:155 | Comments:0 | Tags:Security Awareness

3 Emerging Innovations in Technology that Will Impact Cyber Security

It goes without saying that innovations and trends in technology have a direct impact on digital security. Just look at what happened with COVID-19. As organizations switched their workforces to remote connectivity, many security teams shifted their attention to deploying enterprise-wide VPNs and partnering with employees to harden their home networks/device
Publish At:2020-07-22 06:51 | Read:115 | Comments:0 | Tags:Featured Articles Security Awareness Foundational Controls i

Cookies: An overview of associated privacy and security risks

IntroductionAnyone who regularly browses the internet must have seen some sort of pop-up or other form of alert about the use of cookies. Some sites even give you the option to accept cookies completely or only partially. So, there is an important question to answer: is it safe to enable cookies?In truth, the use of cookies can be traced back to the da
Publish At:2020-07-07 11:43 | Read:197 | Comments:0 | Tags:Security Awareness

Top 9 free security training tools

Cybersecurity training is one of the best defenses against cyber attacks targeting organizations and individuals alike. Although security training is a tried-and-true defense against cyber attacks and data breaches, security training is not one-size-fits all. Every organization faces unique threats based on their industry, cybersecurity tools and secur
Publish At:2020-07-07 11:43 | Read:185 | Comments:0 | Tags:Security Awareness general security phishing security awaren

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails
Publish At:2020-07-02 15:59 | Read:174 | Comments:0 | Tags:Application Security Endpoint Mobile Security Advanced Malwa

Vishing spikes as workforces go remote: 6 vishing prevention tips anyone can follow

IntroductionWith thousands of teams worldwide being asked to work remotely to help contain the spread of COVID-19, scammers have a fertile ground to prey upon telecommuters. One scam that workers probably weren’t warned about is vishing. This is a type of fraud where adversaries use the phone and social engineering techniques to obtain confidential inf
Publish At:2020-07-01 16:44 | Read:171 | Comments:0 | Tags:Security Awareness

Can 2FA prevent breaches? Lessons learned from the SFO airport watering hole attack

IntroductionIn March 2020, two websites serving customers of San Francisco International Airport were hacked. The websites used first-factor authentication only and the cybercriminals had inserted code that allowed usernames and passwords to be stolen.Passwords are flimsy. A quick phish or hack of an insecure database and your password is gone, stolen
Publish At:2020-06-30 09:51 | Read:176 | Comments:0 | Tags:Security Awareness

Dark web fraud: How-to guides make cybercrime too easy

Introduction to dark web fraudDark web fraud constitutes a global information security problem. The widespread availability of how-to guides providing instructions on how to commit such fraud exacerbates the problem even further.Before examining these how-to guides in detail, we need to explain the meaning of “dark web.” The web includes two main layer
Publish At:2020-06-29 10:41 | Read:182 | Comments:0 | Tags:Security Awareness

How to stay cyber-secure at home with a secure home network

Introduction: Working from home made secureMany companies across the world have been introducing their employees to the concept of working from home. Although the COVID-19 lockdown is beginning to open up in certain areas, what is clear is that home working will continue to be a widespread option for businesses.As a model, remote and home working was i
Publish At:2020-06-15 10:48 | Read:353 | Comments:0 | Tags:Security Awareness

Security awareness training and cyber insurance: Prevention, treatment or both?

Cybersecurity risk management: A business priorityManaging cybersecurity risk should be a priority for all organizations, no matter the size or industry. Bad actors don’t discriminate based on company size or business model, and the ever-growing number of cybersecurity attacks and data breaches is a reminder that no business can afford to ignore this r
Publish At:2020-06-08 12:48 | Read:208 | Comments:0 | Tags:Security Awareness

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift is required to maintain cyber resilience. Cybersecurity, often an afterthought in a strong economy, must not be neglected in responding to shifts in the business landscape. As more companies expand their remote workforce, the number of endpoints with access to corpora
Publish At:2020-06-04 12:22 | Read:317 | Comments:0 | Tags:Data Protection Identity & Access Business Continuity C-Suit

Tools

Tag Cloud