HackDig : Dig high-quality web security articles

The Right Way to Respond to a Data Breach

Cybersecurity has become a board level discussion, and worries about cybersecurity breaches are part of what keeps C-suite execs and BOD members up at night. So much so that many organizations have started to adopt the mentality that they’ve likely been breached already and they just don’t know it yet. It’s what’s known as the “assume breach” mentality, whic
Publish At:2016-09-26 14:50 | Read:7178 | Comments:0 | Tags:Cyber Security Featured Articles Adopbe Anthem breach Home D

The ‘I’m Too Small to be a Target’ Fallacy

When retailer Target was hacked in 2013, the damage was so extensive that direct costs exceeded $250 million. To its credit, Target’s external-facing cybersecurity wasn’t too bad; the attack came through a mom-and-pop HVAC vendor with unnecessary access to the retailer’s network.Smaller enterprises like the HVAC company are often under the illusion that they
Publish At:2016-08-29 10:50 | Read:4292 | Comments:0 | Tags:Cyber Security Featured Articles breach cybersecurity hack T

88 Percent of Networks Susceptible to Privileged Account Hacks

IT professionals have long grappled with the inherent risks associated with privileged accounts. Whenever credentials that allow other employees to login to servers, routers, and so forth, are compromised, it can have a dire outcome on the rest of the network.A security firm this week is warning exactly how dire those consequences can be. Virtually no organi
Publish At:2015-11-10 15:50 | Read:4930 | Comments:0 | Tags:Compliance Privacy SMB Security Web Security Credentials Cyb

Survey: 40% of Consumers Will Switch Retailers for Enhanced Security, More Payment Options

Consumers today demand options, value and security in order for their loyalty to a brand to stay intact.According to a recent study, nearly half of consumers across generations said they’d be willing to switch retailers if the company offered enhanced payment security measures, and accepted other forms of payment, such as Google Wallet or digital currencies.
Publish At:2015-10-16 02:25 | Read:4818 | Comments:0 | Tags:Off Topic EMV Survey Target

This Week in Security: Newly Active Malware Campaign, Apple AirDrop Bug, Russian Cyberespionage

Our security roundup series covers the week’s trending topics in the world of InfoSec. In this quick-read compilation, we’ll let you know of the latest news and controversies that the industry has been talking about recently.Here’s what you don’t want to miss from the week of September 14, 2015:A new, active malware campaign has compromised thousands of Word
Publish At:2015-09-19 00:55 | Read:5036 | Comments:0 | Tags:This Week in Security Apple iOS malware Russia Schneider Ele

Target Says SEC Won’t Pursue Enforcement Action as a Result of Data Breach

Target officials say that the Securities and Exchange Commission, one of several U.S. agencies investigating the massive data breach at the company in 2013, has decided not to punish Target as a result of the breach.The Target data breach is one of the larger such incidents ever. The breach affected more than 100 million people and the attackers stole credit
Publish At:2015-08-28 02:20 | Read:5786 | Comments:0 | Tags:Data Breaches Government Malware data breach malware SEC Tar

This Week in Security: Data Dumps, IRS Breach Doubles, Spotify Overhauls Privacy Policy

Our security roundup series covers the week’s trending topics in the world of InfoSec. In this quick read summary, we’ll let you know of the latest reports and controversies that the industry has been talking about recently.Here’s what you don’t want to miss from the week of August 17th, 2015:The Ashley Madison hack went from bad to worse after the data that
Publish At:2015-08-22 04:25 | Read:5852 | Comments:0 | Tags:This Week in Security Ashley Madison China internet explorer

BSides LV Preview: Fight Back – Raising Awareness @ Infosec

Why do we need security awareness? Apps/tools/services are under constant scrutiny, and researchers are continuously looking to solve the multitude of problems accidentally created by developers.It’s hard to admit, but researcher evolution, motivation and attitudes are currently more up-to-date than many organizations’ ability to fight back against the
Publish At:2015-07-23 05:10 | Read:4815 | Comments:0 | Tags:Featured Articles Security Awareness Anthm BSides Las Vegas

IT Security: Evolving to a Risk-Based Approach

As news of information breaches and personal data theft become more prevalent and popular in the press, technologists are witnessing and taking part in the rapid evolution of the once neglected realm of cybersecurity. Hopefully, this process results in an integrated, enlightened solution to what is a very complicated puzzle.Moving Beyond a Fear-Based Approac
Publish At:2015-06-09 12:36 | Read:6816 | Comments:0 | Tags:Cyber Security Featured Articles IT Security and Data Protec

Health records are the new goldmine for hackers

According to Top CSO news website, security experts predict that “Health records are worth more and easier to get than credit card data” The rise in health data breach headlines, may not necessarily suggest an increase in actual data breaches. It’s possible that organizations are just getting better at discovering that they’ve
Publish At:2015-03-26 18:05 | Read:3824 | Comments:0 | Tags:Breaking News Security Anthem dat breach health care Health

How to Stay Off the Data Breach List

Though cyberattacks dominated the news in 2014, with companies such as JPMorgan Chase, Target and Home Depot suffering from breaches, cyberattacks aren’t limited to only big companies. Brand recognition matters little to cybercriminals, and organizations of all sizes have been victims of a data breach. This trend will likely continue in 2015, with atta
Publish At:2015-03-04 00:30 | Read:4429 | Comments:0 | Tags:Network & Endpoint Cyberattack Cybersecurity Data Breach Hom

Cyber-security: Changing the Economics!

   The impact of recent cyber attacks will be felt for years to come, perhaps having risen to a new level of hurt with the Target and Sony attacks. With a Fortune 500 CEO ousted and a Hollywood movie held hostage, cyber-security is on the minds of chief executives and board members as they gather in their first meetings of 2015. How can a massive organizatio
Publish At:2015-01-27 23:20 | Read:4569 | Comments:0 | Tags:Uncategorized cyber-security security architecture Target

Judge Ruling Favors Financial Institutions in Target Lawsuits, Paves Legal Roadmap For Cases To Follow

On Tuesday, a federal judge rejected Target Corporation’s attempt to dismiss multiple claims made by several banks in an effort to minimize their financial burdens caused by the retailer’s massive data breach in late 2013.Following the compromise of 40 million customers’ credit cards, a group of financial institutions filed lawsuits against Target, claiming
Publish At:2014-12-05 21:25 | Read:4627 | Comments:0 | Tags:Top Security Stories breach Target

Avoiding Data Breaches with Context Aware Behavioral Analytics

RESTON, VA – Security, it turns out, is all about layers, where if one layer fails, there are secondary and tertiary and a long line of backup defenses. This is neither new nor revolutionary. It’s why castles had moats, drawbridges and parapets; it’s also why prisons have cells, walls and gates.When you move from the physical to the cybersp
Publish At:2014-12-03 16:35 | Read:5350 | Comments:0 | Tags:Data Breaches Web Security avivah litan data breach gartner

Home Depot Breach Reveals Similarities to Target Breach

We are learning more about the Home Depot breach and it is beginning to show a remarkable resemblance to the Target breach. The initial point of intrusion again appears to have been compromised credentials from a trusted third-party business partner.Once the attackers were inside the network they were able to gain access to the main Home Depot network by tak
Publish At:2014-11-07 04:35 | Read:5171 | Comments:0 | Tags:Incident Detection Top Security Stories Data Breaches Home D

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3