HackDig : Dig high-quality web security articles for hackers

Can your social-media past haunt you?

TV host Jimmy Fallon recently had to issue an apology for making an impersonation of Chris Rock while in blackface in a skit for Saturday Night Live that aired twenty years ago. In the comedy sketch, the host of NBC’s The Tonight Show Jimmy Fallon is seen performing wearing brownface makeup. After the video resurfaced, Jimmy Fallon used Twitter to say his de
Publish At:2020-06-01 07:20 | Read:257 | Comments:0 | Tags:Mobile News privacy social media

10 Ways to Build a Healthy Relationship with Technology

Most of us have been introduced to a remote lifestyle by this point. Meetings, classes, and workouts are now being hosted virtually. Fortunately, that means greater access for more people and scheduling flexibility. Unfortunately, it also means screen time is at an all-time high. The average adult gets 63.5 notifications per day, many of which are viewed wit
Publish At:2020-05-24 08:27 | Read:192 | Comments:0 | Tags:Tips Infographics social media technology tips

When the coronavirus infodemic strikes

Social media sites are stepping up their efforts in the war against misinformation… specifically, the coronavirus/COVID-19 infodemic. There’s a seemingly endless stream of potentially dangerous misinformation flying around online related to the COVID-19 pandemic, and that could have fatal results.It’s boomtown in fake-news land riding high on the wave
Publish At:2020-05-24 07:20 | Read:169 | Comments:0 | Tags:Scams archive conspiracy theories conspiracy theory coronavi

How social media platforms mine personal data for profit

It’s almost impossible not to rely on social networks in some way, whether for personal reasons or business. Sites such as LinkedIn continue to blur the line, increasing the amount of social function over time with features and services resembling less formal sites, such as Facebook. Can anyone imagine not relying on, of all things, Twitter to catch up on br
Publish At:2020-04-04 16:45 | Read:590 | Comments:0 | Tags:Privacy advertising Data privacy facebook gated content Link

Facebook Messenger may ban mass-forwarding of messages

byLisa VaasFacebook Messenger may ban mass-forwarding of messages in an effort to lasso the runaway forwarding of COVID-19 fake news and rumors, it confirmed on Sunday.Facebook has done this before when its other messaging services have gone berserk with forwarding hysterical misinformation – misinformation that led to people getting lynched in the fak
Publish At:2020-03-24 09:55 | Read:989 | Comments:0 | Tags:Facebook Fake news Mobile Social networks chat apps coronavi

7 Spring Cleaning Tasks to Improve Data Security

This year, March 19 ushered in spring in the Northern Hemisphere — the first time since 1896 that the season has started so early. So why not take advantage of the season’s early arrival to do some spring cleaning, not only of your physical space, but of your data and systems, too? Digital spring cleaning can make your life easier and dramatically impr
Publish At:2020-03-20 10:40 | Read:542 | Comments:0 | Tags:Data Protection Mobile Security Application Security Cloud C

How CIAM Addresses the Challenges of Consumer Identity Management

Consumer identities are at the heart of brand engagements today. Digital interactions are a routine part of our lives and touchpoints for consumers have reached astounding heights. Nearly 60 percent of the world is digitally connected and more than half of the world’s population will be using social media by the middle of 2020, according to We Are Soci
Publish At:2020-03-19 08:08 | Read:573 | Comments:0 | Tags:Identity & Access Security Services Business Continuity Comp

From Nigerian Princes to Bitcoin Trading: Online Scams Have Come a Long Way

It would be a challenge to find someone who has not heard of the now-infamous “Nigerian Prince scams,” also known as “419 scams” and “advance-fee scams.” The concept itself dates back to the French Revolution, but it has come a long way due to human gullibility. More recently, it has taken to the internet to deceive scores
Publish At:2020-03-09 07:28 | Read:535 | Comments:0 | Tags:Fraud Protection Bitcoin Cryptocurrency Fraud Malicious Doma

APWG Year-End Report: 2019 A Roller Coaster Ride for Phishing

<p>The latest Phishing Activity Trends Report from the Anti-Phishing Working Group (APWG), which compiles insights from member companies, announced that the year-end number of reported phishing websites for 2019 reached a record high. Most menacing; however, are the trends of phishing gangs targeting users of web-hosted email, social media, and busines
Publish At:2020-03-03 17:11 | Read:489 | Comments:0 | Tags:APWG BEC https social media

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful. In 2018 and 2019, attackers used phishing as an entry point for one-third of all attacks tracked by IBM X-Force Incident Response and Intelligence Services (IRIS) — the most commonly used of all known a
Publish At:2020-03-03 07:18 | Read:685 | Comments:0 | Tags:Threat Intelligence Business Email Compromise (BEC) Data Bre

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates

Network data collected by the NetBlocks internet observatory confirm that Turkey has blocked access to social media as Idlib military crisis escalates Network data collected by the NetBlocks internet observatory confirm that the Turkish authorities have blocked access to social media following allegations of an attack on Turkish troops in Idlib, Syria on
Publish At:2020-02-28 11:50 | Read:508 | Comments:0 | Tags:Breaking News Digital ID Intelligence Security Social Networ

TikTok Explained to a Millennial

The chances that you have heard of apps such as TikTok and Byte are high, but the likeliness of you having one of those apps on your phone are pretty slim unless you were born after 1997. Over the last couple of years, TikTok has been causing a real stir among teenagers making the app the second most downloaded app in the world for 2019. With more than a bil
Publish At:2020-02-20 05:31 | Read:610 | Comments:0 | Tags:Mobile News Social Media apps TikTok

X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

The volume of threats that security teams see on a daily basis can make it especially difficult to look at the big picture when it comes to developing an effective cybersecurity strategy. To see through the flood of data and alerts, organizations depend on actionable threat intelligence to help them understand and mitigate risks. Looking at long-term trends
Publish At:2020-02-11 08:51 | Read:772 | Comments:0 | Tags:Advanced Threats Threat Intelligence Cloud Cloud Adoption Cl

Facebook knows a lot about your online habits – here’s how to stop it

byDanny BradburyFacebook is rolling out a global tool to help you understand what other sites and apps tell it about your activities, to make it forget what they’ve shared in the past, and to control what they share in the future. It’s called Off-Facebook Activity, and it’s part of the company’s effort to appear more privacy-friendly
Publish At:2020-01-30 12:35 | Read:680 | Comments:0 | Tags:Facebook Privacy Social networks off facebook activity onlin

Why You Should Take Social Media Account Takeover as Seriously as a BEC Attack

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Social%20BEC.png?width=300&amp;name=Social%20BEC.png" alt="Social BEC" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">Social media account compromise is nothing new. If you haven’t had an account hacked in the past, most of us know someone who has. According to a
Publish At:2020-01-24 10:40 | Read:649 | Comments:0 | Tags:social media Digital Risk Protection

Announce

Share high-quality web security related articles with you:)

Tools