HackDig : Dig high-quality web security articles for hacker

DUHK Attack allows attackers recover encryption keys used to secure VPN connections and web browsing sessions

DUHK is a vulnerability that allows attackers to recover secret encryption keys used to secure VPN connections and web browsing sessions After the disclosure of the KRACK and ROCA attacks, another attack scenario scares IT community. It is the DUHK vulnerability (Don’t Use Hard-coded Keys), it is the last cryptographic implementation vulnerability tha
Publish At:2017-10-25 07:50 | Read:1014 | Comments:0 | Tags:Breaking News Hacking DUHK attack encryption VPN

Hotspot Shield VPN threatens your privacy by injecting ads and JS into browsers

The CDT urged US federal trade authorities to investigate VPN provider AnchorFree for deceptive and unfair trade practices. The digital rights advocacy group Center for Democracy & Technology (CDT) urged US federal trade authorities to investigate VPN provider AnchorFree for deceptive trade practices. AnchorFree provides the Hotspot Shield VPN app claimi
Publish At:2017-08-08 05:45 | Read:1937 | Comments:0 | Tags:Breaking News Digital ID Security AnchorFree CDT Center for

Three years ago ProtonMail was launched. Today, it is launching ProtonVPN

ProtonMail announced ProtonVPN is now available to the general public. ProtonVPN is officially out of beta. You can now directly get ProtonVPN by visiting https://protonvpn.com After more than 1 year of development, and four months of beta testing by over 10’000 members of the ProtonMail community, we’re finally making ProtonVPN available to everyone. And we
Publish At:2017-06-21 18:15 | Read:2120 | Comments:0 | Tags:Breaking News Digital ID privacy ProtonMail ProtonVPN VPN

4 Possible Ways to Make Your Browser Hacker-Proof

Browsers are constantly targeted by hackers. Here are 4 ways you can make your browser hacker-proof. Use them to stay secure on the web. Browsers have long been a hot target of numerous hacking-related incidents. They are the primary source of hacking incidents as we search, share, watch and download files from browsers. Moreover, various vulnerabilities exi
Publish At:2017-06-07 04:20 | Read:1528 | Comments:0 | Tags:Breaking News Digital ID browser hacker-proof Hacking privac

U.S. Senate Votes Could Put Your Data Privacy at Risk

Data privacy is a concern for many Americans, but the U.S. Senate is on its way to putting your data at even higher risk of privacy issues. Current laws have broadband privacy rules in place that require Internet Service Providers to receive explicit consent from consumers before they can share or sell private information, such as web browsing data, to adver
Publish At:2017-04-01 21:25 | Read:2381 | Comments:1 | Tags:Featured Articles IT Security and Data Protection data Priva

How safe are VPNs?

It’s a tough economy out there. Things are looking up, alright. But for some low-life criminals like Joe Crook, ANY work will always be too much work anyway. So what do people like Joe Crook do? They scheme. They’re on the lookout for the latest scam so that they can defraud you of your hard-earnt cash. How does a vpn work? Take VPN technology for example. F
Publish At:2017-03-31 20:10 | Read:1326 | Comments:0 | Tags:Mobile News Security Hackers security VPN

Post-FCC Privacy Rules, Should You VPN?

Many readers are understandably concerned about recent moves by the U.S. Congress that would roll back privacy rules barring broadband Internet service providers (ISPs) from sharing or selling customer browsing history, among other personal data. Some are concerned enough by this development that they’re looking at obfuscating all of their online brows
Publish At:2017-03-31 00:25 | Read:1073 | Comments:0 | Tags:Other DNS leak eff Electronic Frontier Foundation IPv6 leak

Wireless Routers: First Line of Defense

Almost everything you read or hear about routers includes a sentence or two about router security. The focus is generally on this essential piece of hardware as the first line of defense in an internet-connected world. Many medium-sized companies and large corporations take this into account when they purchase and set up their network infrastructure.They ten
Publish At:2017-03-20 14:30 | Read:1457 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Network Ro

Dozens of Android VPN Apps Fail to Protect Users’ Privacy, Study Reveals

One of the best friends a user can have in today’s digital age is a virtual private network (VPN). This tool masks a user’s IP address and tunnels their data through a network of servers. In so doing, a VPN helps a user anonymously and more securely browse the web.Unfortunately, not all VPNs fulfill that purpose. A group of researchers from Queen
Publish At:2017-01-30 18:30 | Read:1379 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Android an

DNS Evil Lurking Around Every Corner

Today, I came across a blog post that once again showcases the importance of properly managing DNS through its entire lifecycle.The article entitled “Respect My Authority – Hijacking Broken Nameservers to Compromise Your Target” (sic) was written by Matthew Bryant (@IAmMandatory). It can be found here. It’s a bit of long read but serves as a great reminder a
Publish At:2017-01-24 15:10 | Read:1969 | Comments:0 | Tags:Featured Articles IT Security and Data Protection DNS Netsec

How and Why Small Businesses Are Investing in Cybersecurity

Businesses of all sizes are taking note that cyber threats are continually on the rise. No one is safe. In our digital world, you just can’t be too cautious when it comes to protecting your data. This is true whether your company employs 200,000 or 10 employees. Cyber criminals have no bounds. They just want to profit off of your information. That goes
Publish At:2017-01-02 01:30 | Read:1121 | Comments:0 | Tags:Cyber Security Featured Articles anti-virus Cyber Crime cybe

Here’s How VPNs Can Bolster Your Digital Security

Contrary to popular belief, VPNs are not restricted to being used for gaining unrestricted access to the internet alone.VPNs are by far one of the most effective tools for you to enhance your online security and anonymity. If you are not sure how VPNs can help you in this regard and need help figuring out their many applications, then read on to learn more a
Publish At:2016-12-30 18:15 | Read:1412 | Comments:0 | Tags:Featured Articles Security Awareness Privacy security VPN

FBI Arrests Man for Using Xtreme DDoS-for-Hire Service

The Federal Bureau of Investigations (FBI) has arrested a man for renting out portions of the Xtreme DDoS-for-hire service to conduct distributed denial of service attacks.On 9 December, the FBI arrested and charged Sean Sharma, a 26-year-old graduate student at the University of Southern California, for launching a DDoS attack against the San Francisco-base
Publish At:2016-12-19 22:10 | Read:1586 | Comments:0 | Tags:Latest Security News botnet DDoS Europol Operation Tarpit VP

7 Online Tools for Security Managers

Protecting the company’s servers and online presence is a task that requires a lot of effort. As a result, the reality of securing the online environment is hitting companies hard because hackers and malware constantly find new ways to compromise their online security and privacy.Following a hack or breach, days, months and even years of work could be lost.
Publish At:2016-12-13 17:55 | Read:3132 | Comments:0 | Tags:Featured Articles IT Security and Data Protection ad blocker

What is a VPN and how it Works?

Watch your favorite shows anywhere, and other useful VPN functions In simple terms, a VPN, or Virtual Private Network, is a connection between a group of discrete networks that exchanges encrypted data between your computer and a distant server. Sounds like boring technical jargon? Well, VPN’s can actually be used to perform some pretty neat tricks online t
Publish At:2016-12-08 01:30 | Read:1781 | Comments:0 | Tags:Internet Security Mobile News Internet VPN


Share high-quality web security related articles with you:)


Tag Cloud