HackDig : Dig high-quality web security articles for hacker

Google Hacker found a new way to bypass Microsoft Windows Defender

The Google Project Zero expert Tavis Ormandy has found a flaw in Windows Defender that allow attackers to bypass the Microsoft anti-virus tool. The popular Google Project Zero hacker Tavis Ormandy has discovered a new bug in Windows Defender that allow attackers to circumvent the Microsoft anti-virus tool. Ormandy publicly disclosed the news of the vulnerabi
Publish At:2017-06-27 03:10 | Read:377 | Comments:0 | Tags:Breaking News Hacking anti-virus Microsoft Windows Defender

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:522 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

Signatures Not the Root of Prevention

Faulty file definitions strike once again! On April 24, anti-virus provider Webroot issued an automated update to its signature definitions. This inadvertently quarantined hundreds of critical customer files and applications that it erroneously flagged as malicious. At one time or another, it seems that every anti-malware endpoint security provider has fal
Publish At:2017-05-13 12:35 | Read:551 | Comments:0 | Tags:Breaking News anti-virus file-based updates Isolation malici

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics
Publish At:2017-04-18 02:05 | Read:860 | Comments:0 | Tags:Breaking News Threats anti-virus command control EDR Events

How and Why Small Businesses Are Investing in Cybersecurity

Businesses of all sizes are taking note that cyber threats are continually on the rise. No one is safe. In our digital world, you just can’t be too cautious when it comes to protecting your data. This is true whether your company employs 200,000 or 10 employees. Cyber criminals have no bounds. They just want to profit off of your information. That goes
Publish At:2017-01-02 01:30 | Read:750 | Comments:0 | Tags:Cyber Security Featured Articles anti-virus Cyber Crime cybe

Fear Sells; is FUD an acceptable marketing tool?

Fear Sells; is FUD an acceptable marketing tool? Posted by Kevin on June 6, 2016.Fear sells. Fear is what makes us buy security products. If there was no fear, we wouldn’t buy them.This simple statement lies behind the ever-present question that maybe, just maybe, the security in
Publish At:2016-06-06 09:35 | Read:2135 | Comments:0 | Tags:Expert Views Kevin Townsend's opinions anti-virus

Panda Security, the tested anti-virus

Be careful! Not all anti-virus systems are what they seem and many are more hazardous than helpful for your cyber security, so was said in a recent investigation.  The investigation concluded that, today, most anti-virus’ tend to lower the threshold of Internet browser security.  Can they protect us against external threats?  How effective are they? Tradit
Publish At:2016-05-09 23:25 | Read:1163 | Comments:0 | Tags:News Panda Security anti-virus Concordia University vulnerab

Banking Protection – how does it work?

Security products are usually protecting you silently in the background. Until they encounter something malicious, that is. But there is one exception. You may have seen a banner in the upper part of the screen when visiting sites dealing with money. That’s our Banking Protection kicking in. It’s available in both Internet Security and our brand new SAFE. Le
Publish At:2016-01-05 20:45 | Read:736 | Comments:0 | Tags:Security anti-malware anti-virus banking protection banking

4 Things to Consider When Assessing Device Posture for Effective Network Access Control

By Benny Czarny One of the main reasons to have a NAC (Network Access Control) system in place is to keep risky devices from connecting to your organization’s network. Unfortunately, simply purchasing a NAC solution is not going to guarantee your protection. You will also need to consider several other elements in addition to acquiring an NAC solution, inclu
Publish At:2015-12-15 18:10 | Read:802 | Comments:0 | Tags:Online Security Anti-Malware anti-virus encryption endpoint

Three Reasons Why Anti-Virus Alone is No Longer Enough

So many home, and even business users, are complacent about the level of protection they are currently receiving from their traditional anti-virus (AV) software. I have real-time protection in my AV!  That’s enough, right? Nope. Not any more. The malware ecosystem has changed drastically in the past 10 years, to the point that the old precautions are j
Publish At:2015-11-11 21:00 | Read:714 | Comments:0 | Tags:Security Threat Anti-Malware anti-virus malvertising malware

A Snapshot of Black Hat USA 2015

Last month, The State of Security shared the details of 12 intriguing talks from this year’s BSidesLV along with several security experts’ comments about why BSides, as an institution, continues to hold substantial appeal among infosec folks.Our post notes that BSidesLV, among other things, is held in Las Vegas at the same time as Black Hat USA –
Publish At:2015-09-17 13:40 | Read:1313 | Comments:0 | Tags:Cyber Security Featured Articles anti-virus automotive secur

Signatures newsflash: AV doesn’t detect what it doesn’t detect

Signatures newsflash: AV doesn’t detect what it doesn’t detect Posted by David Harley on July 20, 2015.I came across a nicely understated sideswipe at anti-malware in an article by Darren Pauli for the Register on Symantec’s report of a dramatic decline in spam levels
Publish At:2015-07-20 18:00 | Read:707 | Comments:0 | Tags:David Harley anti-virus blacklisting Darren Pauli signatures

The anti-virus industry does itself no favours

The anti-virus industry does itself no favours Posted by Kevin on July 11, 2015.For years there have been suspicions that the anti-virus industry is maybe not so clean from NSA taint as it should be. I have been one of those doubters:AV and the NSA: is the anti-virus industry in bed wi
Publish At:2015-07-11 09:25 | Read:697 | Comments:0 | Tags:Expert Views Kevin Townsend's opinions anti-virus Malware Vi

#HackerKast 40: OPM Breach, Sourcepoint, AdBlock Plus, NSA and AV software, Adobe Flash, Chrome Listens In via Computer

Regards, Hey Everybody! Welcome to our 40th HackerKast! Thanks for listening as always and lets get to the news! Our first story to chat about this week was news bubbling up still about the recent OPM breach. This time, the news outlets are latching on to the fact that data encryption wouldn’t have helped them in this case. Jeremiah poses the question
Publish At:2015-06-27 04:20 | Read:1496 | Comments:0 | Tags:Industry Observations Technical Insight Tools and Applicatio

Still speculating about anti-virus after all these years?

Still speculating about anti-virus after all these years? Posted by Kevin on June 23, 2015.The Intercept yesterday published an article titled Popular Security Software Came Under Relentless NSA and GCHQ Attacks. I am one who in the past has wondered about the relationship between the
Publish At:2015-06-23 11:55 | Read:802 | Comments:0 | Tags:Expert Views Kevin Townsend's opinions News News_malware New

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud