HackDig : Dig high-quality web security articles for hacker

A week in security (December 2 – December 8)

Last week on Malwarebytes Labs, we took a look at a new version of the IcedID Trojan, described web skimmers up to no good, and took a deep dive into containerization. We also explored a report bringing bad news for organizations and insider threats, and threw a spotlight on a video game phish attack. Other cybersecurity news Delivery firm runs into trouble
Publish At:2019-12-09 16:50 | Read:315 | Comments:0 | Tags:A week in security amazon bank buckets phish week in securit

Please don’t buy this: smart doorbells

Though Black Friday and Cyber Monday are over, the two shopping holidays were just precursors to the larger Christmas season—a time of year when online packages pile high on doorsteps and front porches around the world. According to some companies, it’s only logical to want to protect these packages from theft, and wouldn’t it just so happen that t
Publish At:2019-12-09 16:50 | Read:350 | Comments:0 | Tags:Please don't buy this amazon August View Bitdefender black f

Google chief warns visitors about smart speakers in his home

byLisa VaasApparently caught off-guard by a question from the BBC, Google hardware chief Rick Osterloh made up a privacy etiquette rule on the spot last week when he said that yes, homeowners should tell guests that they’ve got smart speakers running in their homes.At any rate, that’s what he does, he said.Here’s his reported response after
Publish At:2019-10-22 05:45 | Read:476 | Comments:0 | Tags:Amazon Google IoT Privacy Alexa Amazon Echo eavesdropping Go

A week in security (October 14 – 20)

Last week on Malwarebytes Labs, we tried to unlock the future of the password (its vulnerabilities, current alternatives, and possible future disappearance), analyzed the lagging response by many businesses in adopting a patch for Pulse VPN vulnerability, looked at Instagram’s bulked-up security against phishing emails scams, and were reminded that ransomwar
Publish At:2019-10-21 16:50 | Read:595 | Comments:0 | Tags:A week in security amazon Dark Web domestic abuse domestic a

A week in security (October 7 – 13)

Last week on Malwarebytes Labs, we peered into the possible future of cybersecurity insurance, described the process for securing today’s managed service provider, and provided an in-depth explainer on the business espionage tactic known as “war shipping.” Further, in considering the intersection of National Cybersecurity Awareness Month and National Dom
Publish At:2019-10-14 23:20 | Read:516 | Comments:0 | Tags:A week in security amazon body cams bots chrome cybersecurit

New Apple gear and bizarre Amazon hardware – Intego Mac Podcast, Episode 102

This week on the Intego Mac Podcast, episode 102…It hasn't been long, but Apple has already released iOS 13.1, and iPad OS 13.1, both initially scheduled for next week. (Of course, Apple waited until after we recorded this week's episode to release iOS 13.1.1 and iPadOS 13.1.1.) Josh and Kirk discuss these updates, an Apple security advisory about third-part
Publish At:2019-09-27 22:10 | Read:494 | Comments:0 | Tags:How To Intego Mac Security Podcast Alexa Amazon Amazon Echo

A week in security (September 16 -22)

Last week on Labs, we sounded the alarm about the relaunch of Emotet, one of the year’s most dangerous forms of malware, with a new spam campaign. We also reported on how international students in UK are targeted by visa scammers, what CEOs think about a potential US data privacy law, and introduced Malwarebytes Browser Guard. Finally, we looked at the
Publish At:2019-09-23 23:25 | Read:644 | Comments:0 | Tags:A week in security amazon Browser guard data destruction edu

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Penetration testing is often conducted by security researchers to help organizations identify holes in their security and fix them, before cybercriminals have the chance. While there’s no malicious intent for the researcher, part of his job is to think and act like a cybercriminal would when hacking, or attempting to breach, an enterprise network. T
Publish At:2019-09-20 11:20 | Read:800 | Comments:0 | Tags:Researcher's corner amazon aws AWS buckets data hacking Inte

Another unsecured AWS S3 bucket exposed 4 million Time Warner Cable subscriber records

Experts reported that the AWS S3 storage containing subscriber data was left open by freelancers who handled web applications for the Time Warner Cable. A few days ago, researchers discovered of thousands of resumes of US Military and intel contractors left unsecured on an Amazon server, now roughly four million Time Warner Cable customers in the US were exp
Publish At:2017-09-06 05:15 | Read:3503 | Comments:0 | Tags:Breaking News Data Breach Hacking Amazon AWS S3 cloud storag

Hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket

Security researchers discovered that hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket Security experts continue to discover unsecured AWS storage bucket leaking sensitive data. Last discovery in order of time is an AWS storage related to the hotel booking service Groupize, it was discovered by Kromtech
Publish At:2017-08-23 05:05 | Read:3708 | Comments:0 | Tags:Breaking News Data Breach Amazon AWS data leak Groupize Maci

Hacker discovered security flaws in Amazon, Apple and Google epub services

A hacker discovered a XXE flaw in the EpubCheck library that affects major epub services causing information disclosure and denial of service conditions. The security expert and bug hunter Craig Arendt (@craig_arendt) has discovered flaws in major eBook readers including the ones commercialized by Amazon, Apple, and Google. The expert discovered different XM
Publish At:2017-01-27 18:40 | Read:4391 | Comments:0 | Tags:Breaking News Hacking Amazon Apple epub services EpubCheck l

Alexa, Are You Keeping My Information Private?

“By sitting in the alcove, and keeping well back, Winston was able to remain outside the range of the telescreen, so far as sight went. He could be heard, of course, but so long as he stayed in his present position he could not be seen.” The above quote is a snippet from George Orwell’s dystopian-themed novel 1984, where Big Brother is constantly
Publish At:2017-01-12 08:25 | Read:3718 | Comments:0 | Tags:Featured Articles Security Awareness 1984 Alexa Amazon ASK I

Beware of “Your Amazon.com Order Cannot Be Shipped” Scam!

Holiday shoppers who use Amazon.com to purchase gifts will want to look out for a new scam claiming their order can’t ship.Around the beginning of December, users first caught wind of a scam that’s dampening the holiday cheer for users in the United Kingdom and Australia.The bogus emails state “Your Amazon.com Order Cannot Be Shipped”
Publish At:2016-12-09 21:27 | Read:6846 | Comments:0 | Tags:Latest Security News Amazon scam

Chinese IoT Firm Siphoned Text Messages, Call Records

A Chinese technology firm has been siphoning text messages and call records from cheap Android-based mobile smart phones and secretly sending the data to servers in China, researchers revealed this week. The revelations came the same day the White House and the U.S. Department of Homeland Security issued sweeping guidelines aimed at building security into In
Publish At:2016-11-17 06:40 | Read:4447 | Comments:0 | Tags:Other Amazon Azzedine Benameur BestBuy BLU BLU R1 HD Bruce S

Inside ‘The Attack That Almost Broke the Internet’

In March 2013, a coalition of spammers and spam-friendly hosting firms pooled their resources to launch what would become the largest distributed denial-of-service (DDoS) attack the Internet had ever witnessed. The assault briefly knocked offline the world’s largest anti-spam organization, and caused a great deal of collateral damage to innocent bystan
Publish At:2016-08-26 19:55 | Read:9761 | Comments:0 | Tags:Other Aleksey Frolov Alex Optik Amazon Andrei Stanchevici An


Share high-quality web security related articles with you:)


Tag Cloud