HackDig : Dig high-quality web security articles for hacker

More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting

By Feike Hacquebord, Cedric Pernet, and Kenney Lu The threat group regularly referred to as APT33 is known to target the oil and aviation industries aggressively. This threat group has been reported on consistently for years, but our recent findings show that the group has been using about a dozen live Command and Control (C&C) servers for extremely narr
Publish At:2019-11-14 03:20 | Read:195 | Comments:0 | Tags:Botnets Targeted Attacks APT APT33 botnet phishing VPN

Increase your privacy with CyberGhost VPN

If you've followed Intego's blog and podcast for a while, you may recall that we've mentioned the privacy and security benefits of VPNs—virtual private networks—several times. As a quick recap, here are just a handful of the advantages that a good personal VPN can provide:hide your personal IP address from sites you visit, apps you use, and people you e-mail
Publish At:2019-11-11 22:10 | Read:138 | Comments:0 | Tags:Security & Privacy VPN

How to protect yourself from doxing

“Abandon hope all ye who enter.” This ominous inscription affixed atop the gates to Hell in Dante’s Divine Comedy applies peculiarly well to describe the state of the Internet today. It’s hard to draw a parallel to the utility that the Internet has offered to modern civilization—perhaps no other technological innovation has brought about greater chan
Publish At:2019-10-25 16:50 | Read:339 | Comments:0 | Tags:How-tos dox doxer doxing IP address mobile VPNs online priva

A week in security (October 14 – 20)

Last week on Malwarebytes Labs, we tried to unlock the future of the password (its vulnerabilities, current alternatives, and possible future disappearance), analyzed the lagging response by many businesses in adopting a patch for Pulse VPN vulnerability, looked at Instagram’s bulked-up security against phishing emails scams, and were reminded that ransomwar
Publish At:2019-10-21 16:50 | Read:451 | Comments:0 | Tags:A week in security amazon Dark Web domestic abuse domestic a

Tor vs. VPN: What They Do and Which is Better

Online privacy is a growing concern among those surfing the Internet. When surveyed in January of 2019, 53% of online users said they were more concerned about their online privacy this year than they were last year.  With these growing concerns, online users turn to different methods of software such as proxy sites, alternate browsers or private networks. C
Publish At:2019-10-18 21:15 | Read:680 | Comments:0 | Tags:privacy Security cybersecurity Privacy VPN

Pulse VPN patched their vulnerability, but businesses are trailing behind

In April 2019, Pulse Secure published an advisory about a vulnerability in their software. In August, cybercriminals were massively scanning for systems that were running a vulnerable version. Now it’s October, and still many organizations have not applied the patches that are available for this vulnerability. This is a trend we’ve seen repeated wi
Publish At:2019-10-18 16:50 | Read:531 | Comments:0 | Tags:Business cybercriminals exploit exploit kits exploits patch

Instagram flaw exposes private information

Instagram users are being warned of a security loophole that could be used to expose their private posts. This means that private posts and messages could be shared with almost anyone – not just trusted friends. Perhaps more worrying is the fact that there are no special tools required to accessing secret posts. It’s all about addresses Every single webpage
Publish At:2019-10-17 10:35 | Read:291 | Comments:0 | Tags:Mobile News Social Media Privacy social media VPN

15 Easy, Effective Ways to Start Winning Back Your Online Privacy

Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a few minutes. I certainly don’t need any more stuff. However, if I could name one gift that would make me absolutely giddy, it would be getting a chunk of my privacy back. Like most people, the internet knows way too much about me — my age, address, phone
Publish At:2019-10-12 11:20 | Read:539 | Comments:0 | Tags:Family Safety ad blockers children's privacy cloud security

Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know

I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas, I Venmo it. A Taco Bell study break with the roommates? No problem. With one click, I transfer money from my Venmo account to hers. She uses a Venmo credit card to make her purchase. To this mom, cash apps may be the best thing to happen to parenting
Publish At:2019-09-19 23:20 | Read:528 | Comments:0 | Tags:Family Safety app security Apple Pay Cash App cash apps cash

DUHK Attack allows attackers recover encryption keys used to secure VPN connections and web browsing sessions

DUHK is a vulnerability that allows attackers to recover secret encryption keys used to secure VPN connections and web browsing sessions After the disclosure of the KRACK and ROCA attacks, another attack scenario scares IT community. It is the DUHK vulnerability (Don’t Use Hard-coded Keys), it is the last cryptographic implementation vulnerability tha
Publish At:2017-10-25 07:50 | Read:3173 | Comments:0 | Tags:Breaking News Hacking DUHK attack encryption VPN

Hotspot Shield VPN threatens your privacy by injecting ads and JS into browsers

The CDT urged US federal trade authorities to investigate VPN provider AnchorFree for deceptive and unfair trade practices. The digital rights advocacy group Center for Democracy & Technology (CDT) urged US federal trade authorities to investigate VPN provider AnchorFree for deceptive trade practices. AnchorFree provides the Hotspot Shield VPN app claimi
Publish At:2017-08-08 05:45 | Read:4421 | Comments:0 | Tags:Breaking News Digital ID Security AnchorFree CDT Center for

Three years ago ProtonMail was launched. Today, it is launching ProtonVPN

ProtonMail announced ProtonVPN is now available to the general public. ProtonVPN is officially out of beta. You can now directly get ProtonVPN by visiting https://protonvpn.com After more than 1 year of development, and four months of beta testing by over 10’000 members of the ProtonMail community, we’re finally making ProtonVPN available to everyone. And we
Publish At:2017-06-21 18:15 | Read:4371 | Comments:0 | Tags:Breaking News Digital ID privacy ProtonMail ProtonVPN VPN

4 Possible Ways to Make Your Browser Hacker-Proof

Browsers are constantly targeted by hackers. Here are 4 ways you can make your browser hacker-proof. Use them to stay secure on the web. Browsers have long been a hot target of numerous hacking-related incidents. They are the primary source of hacking incidents as we search, share, watch and download files from browsers. Moreover, various vulnerabilities exi
Publish At:2017-06-07 04:20 | Read:5986 | Comments:0 | Tags:Breaking News Digital ID browser hacker-proof Hacking privac

U.S. Senate Votes Could Put Your Data Privacy at Risk

Data privacy is a concern for many Americans, but the U.S. Senate is on its way to putting your data at even higher risk of privacy issues. Current laws have broadband privacy rules in place that require Internet Service Providers to receive explicit consent from consumers before they can share or sell private information, such as web browsing data, to adver
Publish At:2017-04-01 21:25 | Read:9326 | Comments:1 | Tags:Featured Articles IT Security and Data Protection data Priva

How safe are VPNs?

It’s a tough economy out there. Things are looking up, alright. But for some low-life criminals like Joe Crook, ANY work will always be too much work anyway. So what do people like Joe Crook do? They scheme. They’re on the lookout for the latest scam so that they can defraud you of your hard-earnt cash. How does a vpn work? Take VPN technology for example. F
Publish At:2017-03-31 20:10 | Read:2911 | Comments:0 | Tags:Mobile News Security Hackers security VPN

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud