HackDig : Dig high-quality web security articles for hacker

KRACK Detector is a tool to detect and prevent KRACK attacks in your network

How to discover if your network is vulnerable to KRACK attack? KRACK Detector is a script that can detect attacks against client devices on your network. Last week I published a post warning of many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). The Belgian research
Publish At:2017-11-06 10:45 | Read:4511 | Comments:0 | Tags:Breaking News Hacking Internet of Things KRACK attack KRACK

Industrial Products of many vendors still vulnerable to KRACK attack

Many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). Many industrial networking devices are vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack), including products from major vendors such as Cisco, Rockwell Automation, and Sierra Wireless. A
Publish At:2017-10-31 06:55 | Read:2130 | Comments:0 | Tags:Breaking News Hacking KRACK attack Wi-Fi WPA2

Across the Great Divide: Measuring Security Awareness Among US and UK Users

End users in the U.S. and U.K. have very different attitudes toward security. Earlier this summer, Wombat Security surveyed more than 2,000 working adults — half in the U.S. and half in the U.K. — about various cybersecurity topics and perceptions of best practices. The researchers found some interesting surprises and noted a series of different attitudes a
Publish At:2017-08-18 13:25 | Read:2514 | Comments:0 | Tags:Risk Management Cybersecurity Mobile Security Password Manag

Don’t Leave Home Without These Five Travel Security Tips

It’s vacation time for many of us, and that means it’s Christmas for criminals. In their eagerness to experience all the wonders of leisure destinations, travelers are prone to overlooking risks to their physical and digital security. Crooks know this, which is why they target people carrying cameras, sporting backpacks or exhibiting other signs
Publish At:2017-05-25 13:35 | Read:2710 | Comments:0 | Tags:Data Protection Identity & Access Mobile Security Authentica

Ultra Secret Chat Using Wi-Fi Covert Channel

“Covert Channel [Wikipedia]: a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.”Today, in a world where the hacking techniques are getting more and more sophisticated and security meas
Publish At:2017-03-28 06:40 | Read:2859 | Comments:0 | Tags:Off Topic BSides Munich security Wi-Fi

Efficient Wi-Fi Phishing Attacks: Would You Fall for That?

In recent years, Wi-Fi networks are usually secured with the Wi-Fi Protected Access II (WPA2), a security protocol which leverages a strong cryptographic hash function (PBKDF2 with the network’s ESSID as salt) to protect the pre-shared key (PSK).Breaking into a WPA-2 network can be a great challenge during a penetration test. A modern GPU that is able
Publish At:2017-01-05 03:15 | Read:3560 | Comments:0 | Tags:Featured Articles Security Awareness encryption password Phi

Subtlety Is the Danger for Cybercrime Security Efforts

Celebrities who appear to be suddenly successful have long been called “overnight sensations.” In reality, most of these instant stars worked for years to perfect their skills before they got their big break. Cyberattacks often follow the same trajectory. They are not always immediately disruptive because they are executed stealthily over long pe
Publish At:2017-01-03 15:10 | Read:2567 | Comments:0 | Tags:Data Protection Fraud Protection Cyber Espionage Cybercrime

How and Why Small Businesses Are Investing in Cybersecurity

Businesses of all sizes are taking note that cyber threats are continually on the rise. No one is safe. In our digital world, you just can’t be too cautious when it comes to protecting your data. This is true whether your company employs 200,000 or 10 employees. Cyber criminals have no bounds. They just want to profit off of your information. That goes
Publish At:2017-01-02 01:30 | Read:2348 | Comments:0 | Tags:Cyber Security Featured Articles anti-virus Cyber Crime cybe

Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Most users take Bluetooth security for granted. When you’re enjoying the convenience of hands-free phone conversations, streaming podcasts in your car or jogging with your awesome new wireless headphones, do you need to worry about whether the communication channel is secure or not? What’s acceptable for consumers may not meet corporate standards
Publish At:2016-12-13 18:40 | Read:3033 | Comments:0 | Tags:Application Security Data Protection Bluetooth Connected Dev

Research on unsecured Wi-Fi networks across the world

The very nature of wireless Wi-Fi networks means that hackers or criminals simply need to be located near an access point in order to eavesdrop and intercept network traffic. Poorly configured access point encryption or services that allow data to be sent without any encryption pose a serious threat to user data. Confidential data can be protected by encryp
Publish At:2016-11-24 13:10 | Read:4770 | Comments:0 | Tags:Blog Research Encryption Mobile security Wi-Fi

How to Secure Your Mobile Device in Six Steps

The rapidly changing technology and portability of mobile devices have forced people to heavily rely on those products. With their increased functionalities, mobile devices carry out a number of our day-to-day activities, such as surfing the web, booking appointments, setting up reminders, sharing files, instant messaging, video calling, and even mobile bank
Publish At:2016-11-24 12:45 | Read:7397 | Comments:0 | Tags:Featured Articles IT Security and Data Protection encryption

How to tell if your Wi-Fi network has been hacked

Wi-Fi networking is absolutely essential to the modern home. From smartphones to games consoles to intelligent thermostats like Nest, virtually every appliance now requires a wireless internet connection. As a result, there is all kinds of valuable information being transmitted across your Wi-Fi network – credit card numbers, passwords and sensitive photos
Publish At:2016-11-16 13:35 | Read:3811 | Comments:0 | Tags:Mobile News Tips Antivirus Hackers wi-fi

Hacker shows how easy it is to take over a city’s public Wi-Fi network

In a perfect example of how public wireless networks can be dangerous for privacy and security, an Israeli hacker showed that he could have taken over the free Wi-Fi network of an entire city.On his way home from work one day, Amihai Neiderman, the head of research at Israeli cybersecurity firm Equus Technologies, spotted a wireless hotspot that he hadn'
Publish At:2016-11-10 18:10 | Read:2523 | Comments:0 | Tags:Security Networking Hacking Wi-Fi

Staying Ahead of the Workplace IoT Security Curve

While the tech world is abuzz with talk of intelligent ovens, soil-sensing herb pots, and other Internet of Things (IoT) devices that are supposed to revolutionize our homes, another IoT revolution is underway in the workplace. Companies are turning to connected devices to improve day-to-day business functions, and just like us, they have little choice but t
Publish At:2016-11-07 03:25 | Read:3583 | Comments:0 | Tags:Featured Articles Internet of Things cybersecurity DDoS Indu

Most IT Pros Think Cyber Security Not a Priority for Smart City Initiatives, Reveals Survey

Information security is a concern when it comes to smart city technologies. Tripwire found out as much when it commissioned Dimensional Research to speak with 203 IT professionals working for state and local governments about the digital security challenges of implementing smart city initiatives.Out of those who responded, 88 percent of IT professionals said
Publish At:2016-10-19 11:45 | Read:3055 | Comments:0 | Tags:Cyber Security Featured Articles Critical Infrastructure Gri


Share high-quality web security related articles with you:)


Tag Cloud