HackDig : Dig high-quality web security articles

Cryptocurrency scam attack on Twitter reminds users to check their app connections

Are you doing enough to prevent scammers from hijacking your social media accounts?Even if you have chosen a strong, unique password for your online presence and enabled two-factor authentication it’s possible that you’ve overlooked another way in which online criminals could commandeer your social media accounts and spam out a message to your fo
Publish At:2021-05-27 10:35 | Read:211 | Comments:0 | Tags:Featured Articles cryptocurrency Scammers social media

Can a Google Voice Number Be Traced?

May 14, 2021 13 0 Author: Adam Torks Can a Google Voice Number Be Traced? Have you ever wanted to have
Publish At:2021-05-14 06:53 | Read:436 | Comments:0 | Tags:Security Data Internet Social Media

How to Disappear From the Internet

May 04, 2021 10 0 Author: Matthew Turner How to Disappear From the Internet Perhaps it’s time to
Publish At:2021-05-04 07:58 | Read:462 | Comments:0 | Tags:Networks Data Internet Social Media

Social Engineering: Watch Out for These Threats Against Cybersecurity Experts

Many of us remember our parents saying not to take candy from strangers. Today, we can apply a similar mindset to avoid social engineering.  Social engineering is the threat that keeps on coming back. Threat actors are learning to use even cybersecurity researchers’ best intentions against them. Let’s take a look at tactics t
Publish At:2021-05-03 15:46 | Read:367 | Comments:0 | Tags:Fraud Protection Security Services Cybersecurity Fraud Schem

Telegram Bots for Personal Data Searching

April 30, 2021 87 0 Author: Amanda Johnson Telegram Bots for Personal Data Searching With the advent of
Publish At:2021-04-30 06:03 | Read:375 | Comments:0 | Tags:Privacy Social Media Tools Tracking

Bitcoin scammers phish for wallet recovery codes on Twitter

We’re no strangers to the Twitter customer support DM slide scam. This is where someone watches an organisation perform customer support on Twitter, and injects themselves into the conversation at opportune moments hoping potential victims don’t notice. This is aided by imitation accounts modelled to look like the genuine organisation’s account.
Publish At:2021-04-28 16:59 | Read:428 | Comments:0 | Tags:Social engineering bitcoin cryptocoin NFT phish phishing rec

Why is USPS tracking social media posts?

USPS has been tracking social media posts! Yahoo News obtained a document allegedly discovering the existence of a service called Internet Covert Operations Program (iCOP). According to USPS, iCOP assesses threats to Postal Service employees and its infrastructure by monitoring publicly available open-source information that includes social media posts from
Publish At:2021-04-28 12:50 | Read:304 | Comments:0 | Tags:Mobile News News social media USPS

Frequently Used Social Engineering Tactics

April 21, 2021 5 0 Author: Adam Torks Frequently Used Social Engineering Tactics Social engineering, so
Publish At:2021-04-21 06:38 | Read:825 | Comments:0 | Tags:Security Cybersecurity Internet Social Media

Hide Yourself: Anonymous Chat Apps

April 13, 2021 267 0 Author: Matthew Turner Hide Yourself: Anonymous Chat Apps Let’s admit that finding
Publish At:2021-04-14 06:13 | Read:404 | Comments:0 | Tags:Comparisons Security Social Media Tools

Sorry, Joe Biden isn’t offering you a work visa, it’s a scam

A US diplomatic mission in Nigeria warns of a visa scam affecting Nigerian citizens looking to move to the United States. It’s an old scam message, dressed up with a fresh coat of paint. Shall we take a look? Fraud Alert!Scammers and fraudsters are circulating a fake “press release” claiming to offer a new type of work visa to Nigerian citizens aged 40-5
Publish At:2021-04-13 08:49 | Read:475 | Comments:0 | Tags:Malwarebytes news e-visa fake Instagram passport scam social

A week in security (March 29 – April 4)

Last week on Malwarebytes Labs, our podcast featured Malwarebytes senior security researcher JP Taggart, who talked to us about why you need to trust your VPN. You’ve likely heard the benefits of using a VPN: You can watch TV shows restricted to certain countries, you can encrypt your web traffic on public WiFi networks, and, importantly, you c
Publish At:2021-04-05 13:17 | Read:544 | Comments:0 | Tags:A week in security "i accidentally reported you" "i accident

Don’t post it! Six social media safety sins to say goodbye to

If you or anyone you know is committing the below social media sins, it’s time to change that habit of an online lifetime. Even the most innocuous of things can cause trouble down the line, because everyone’s threat model is different. Unfortunately, people tend to realise what their threat model is when it’s already too late. With this handy list,
Publish At:2021-03-26 11:16 | Read:539 | Comments:0 | Tags:Privacy credit cards customer support holiday photographs se

A week in security (March 15 – 21)

Last week on Malwarebytes Labs, our podcast featured Adam Kujawa, who talked us through our 2021 State of Malware report. We cover our own research on: Royal mail parcel scamHow your iPhone can tell you if you’re being stalkedCareers in cybersecurityProxyLogon PoC whack-a-moleTeen behind 2020 Twitter hack pleads guiltyFBI warns of increase in PYSA rans
Publish At:2021-03-22 09:42 | Read:567 | Comments:0 | Tags:A week in security a week in security fake malware phishing

Can You Decode Your Teen’s Texting Language?

It’s hard to believe, right, parents? In just a blink or two, you went from being the teenager dropping cool phrases like “rad” and “gnarly” to monitoring a teenager texting words like “lowkey,” “IRL” and “CD9” into her smartphone non-stop.* For generations, teens have been crafting terms to differentiate themselves from other age groups. The difference toda
Publish At:2021-02-18 21:06 | Read:547 | Comments:0 | Tags:Family Safety cyberbullying facebook social networking prote

Stay Connected & Protected: Weaving Security Into Our Social Media Habits

Stay Connected & Protected: Weaving Security Into Our Social Media Habits Today, there are so many different avenues where we receive information. Personally, I prefer finding out what’s going on in the world by scanning my favorite news channels’ websites and by receiving personalized feeds and notifications to my phone. My wife, however, scans social m
Publish At:2021-02-18 21:06 | Read:645 | Comments:0 | Tags:Consumer social media social media scams WebAdvisor tech sup