HackDig : Dig high-quality web security articles for hackers

Is your smart home hosting malware attacks?

Here on the Panda Security blog, we usually write about malware infecting computers, tablets and smartphones. But the truth is almost any electronic device can be compromised by hackers – including your smart home gadgets. Now researchers have discovered a new family of malware called Mozi that has been quickly spreading online since last year. What does Moz
Publish At:2020-07-23 08:30 | Read:168 | Comments:0 | Tags:Mobile News Security Technology security smarthome

‘Appathy in the UK’: 80% of Brits refuse to download Covid tracking apps

A new survey of nearly 2,000 people* in the UK from Cybersecurity specialists Panda Security, has further thrown in to doubt the ability of the government to effectively track and trace pub and restaurant goers who come in to contact with the COVID-19 virus. Despite the British Government recommending that venues notify customers that they should order food
Publish At:2020-07-15 03:36 | Read:117 | Comments:0 | Tags:Mobile News privacy Technology apps contact tracing covid-19

Tesla close to developing fully autonomous cars, says Elon Musk

Elon Musk, Tesla’s eccentric CEO, said in a pre-recorded video that he is extremely confident that level five or virtually complete self-driving car autonomy will happen soon. In the same video, the real-life Tony Stark highlighted that he is reasonably optimistic that Tesla will have the basic functionality of level five car-autonomy developed by 2021. Elon
Publish At:2020-07-13 05:17 | Read:132 | Comments:0 | Tags:Mobile News Technology autonomous vehicles tesla

Will iPhone replace your passport and driver’s license soon?

Apple has actively been working on making iPhone the sole thing people have to carry while out and about. The company has successfully eliminated the need to carry items such as diary, laptop, car insurance card, credit card, home keys, etc. They also recently announced plans to help humanity get rid of the need for car keys. However, in the USA iPhones have
Publish At:2020-07-03 05:55 | Read:155 | Comments:0 | Tags:Mobile News Technology Apple iPhone

Brits are worried about the COVID-19 tracing app

Like many other countries, the UK government has announced plans for a COVID-19 tracing app to help limit the spread of the virus. An app is currently undergoing testing on the Isle of Wight before being rolled out to the rest of the country later this year. But even before the app goes live there are concerns that the project will fail. Helping reduce local
Publish At:2020-06-24 09:35 | Read:203 | Comments:0 | Tags:Mobile News Security Technology contact tracing covid-19

What is Hacktivism? Campaigns That Shaped the Movement

From protests and sit-ins to doxxing and distributed denial-of-service attacks, a new kind of activism rose in the ranks. In 1996, cyber-activism gained a reputation and was given a new name: hacktivism. Consisting of breaking into a computer system for political, social, religious, or anarchistic reasons, hackers began to wage a war on information. Proven t
Publish At:2020-06-23 14:16 | Read:181 | Comments:0 | Tags:Technology cyberattacks Hackers hacking infographic

Should I Turn My Computer Off at Night? [Flowchart]

As a benchmark, turn new computers off once daily and leave older devices turned on. Although it’s widely accepted that all computers and laptops should be turned off every night, there are some caveats that point to a daily shutdown not being necessary. Even still, when surveying 1,000 Americans about how often they power down their work computer, 37% respo
Publish At:2020-06-01 13:21 | Read:339 | Comments:0 | Tags:Tips flowchart Infographics technology tips

Now anyone can become a cybercriminal

Over recent years, cybercrime and hacking has become more common – we hear of new events almost every day. There are various reasons for this surge in attacks, but one is that hacking is much easier than ever. The world’s biggest library In the past, hacking computer systems required a high degree of expertise. Hackers would spend months and years testing co
Publish At:2020-05-28 05:07 | Read:337 | Comments:0 | Tags:Mobile News Security Technology cybersecurity hacking

What to expect from the contact tracing app Care19?

Researchers are racing to develop a vaccine for Covid-19, but experts say the humanity is many months, and probably even a year, away from seeing vaccines becoming widely available. The global economy won’t survive that much time in strict quarantine, so governments are looking for ways to ease stay-at-home restrictions while continuing to fight the co
Publish At:2020-05-25 07:37 | Read:280 | Comments:0 | Tags:Mobile News Technology apps care19 contact tracing

10 Ways to Build a Healthy Relationship with Technology

Most of us have been introduced to a remote lifestyle by this point. Meetings, classes, and workouts are now being hosted virtually. Fortunately, that means greater access for more people and scheduling flexibility. Unfortunately, it also means screen time is at an all-time high. The average adult gets 63.5 notifications per day, many of which are viewed wit
Publish At:2020-05-24 08:27 | Read:238 | Comments:0 | Tags:Tips Infographics social media technology tips

49% of People Don’t Know How to Disinfect Electronics [Survey]

Cell phones, tablets, and keyboards are a daily part of life. However, the same procedures that go with cleaning common household items does not follow-suit for everyday handheld devices. A study published in Annals of Clinical Microbiology and Antimicrobials explores the contamination levels of handheld devices. It concludes that 94% of phones show evidence
Publish At:2020-04-20 13:47 | Read:587 | Comments:0 | Tags:Technology Tips

5G Technology: How to Make Sure the Benefits Outweigh the Security Risks

It’s hard not to say that 5G technology brings a lot of benefits. 5G entails faster download speeds, and yes, if you have a 5G-enabled handset, you could hear and appreciate the speed increases for videos, gaming, etc. However, 5G provides added benefits that go way above those for the everyday user.Let’s take a look at the high speed and low latency of 5G.
Publish At:2020-04-19 23:42 | Read:491 | Comments:0 | Tags:Vulnerability Management cyberattack Network Security Techno

The tech challenges brought by COVID-19

The panic around the novel coronavirus (COVID-19) continues to result in disruptions rarely seen before in human history. The forefront challenges caused by the virus are certainly with economic and health flavor. However, the millions of people losing their jobs and the tens of thousands of people already killed by the virus are only one part of the problem
Publish At:2020-04-13 05:09 | Read:1012 | Comments:0 | Tags:Mobile News Security Technology coronavirus covid19 Internet

WPA vs WPA2: Which WiFi Security Should You Use?

Wireless networks are everywhere. Whether you’re at a local coffee shop, a school or at home, it’s likely there are multiple wireless networks you can gain access to. But how do you know which ones are safe? Looking at the network security settings can be a good indicator of which ones you can trust. To help you understand your options, we discuss the histor
Publish At:2020-04-08 16:00 | Read:914 | Comments:0 | Tags:Security Technology

10+ Ways to Free up RAM On Your Windows or Mac Device

When you use up all of the available RAM on your computer, you may notice that your device struggles to complete tasks. If you find that your computer’s applications are frequently crashing and it takes longer to do simple tasks, then you might be wondering how to free up RAM on your computer. What is RAM? Your computer’s Random Access Memory (RAM) is store
Publish At:2020-04-04 16:10 | Read:720 | Comments:0 | Tags:Technology Tips


Share high-quality web security related articles with you:)


Tag Cloud