HackDig : Dig high-quality web security articles

Phishing Email Examples: How to Recognize a Phishing Email

Phishing Email Examples: How to Recognize a Phishing Email Keeping your identity safe on the internet can be challenging. Phishing is a scam that tricks you into voluntarily providing important personal information. Protect yourself from phishing by reviewing some examples of phishing emails and learning more about this common online scam. What is phishing?
Publish At:2021-02-18 21:06 | Read:730 | Comments:0 | Tags:Consumer anti-virus phishing scams email

Evolving Security Products for the new Realities of Living Life From Home

Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have followed them home—generating an average of 375 new threats per minute so far this year. In response, our enhanced consumer portfolio directly addresses the new needs and new threats people face. McAfee Labs f
Publish At:2021-02-18 21:06 | Read:473 | Comments:0 | Tags:Consumer malware anti-virus VPN social media protection tech

Trick or Treat: Avoid These Spooky Threats This Halloween

Trick or Treat: Avoid These Spooky Threats This Halloween Spooky season is among us, and ghosts and goblins aren’t the only things hiding in the shadows. Online threats are also lurking in the darkness, preparing to haunt devices and cause some hocus pocus for unsuspecting users. This Halloween season, researchers have found virtual zombies and witches among
Publish At:2021-02-18 21:06 | Read:431 | Comments:0 | Tags:Consumer Threat Notices malware Phishing anti-virus Hallowee

Google Hacker found a new way to bypass Microsoft Windows Defender

The Google Project Zero expert Tavis Ormandy has found a flaw in Windows Defender that allow attackers to bypass the Microsoft anti-virus tool. The popular Google Project Zero hacker Tavis Ormandy has discovered a new bug in Windows Defender that allow attackers to circumvent the Microsoft anti-virus tool. Ormandy publicly disclosed the news of the vulnerabi
Publish At:2017-06-27 03:10 | Read:3770 | Comments:0 | Tags:Breaking News Hacking anti-virus Microsoft Windows Defender

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:6731 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

Signatures Not the Root of Prevention

Faulty file definitions strike once again! On April 24, anti-virus provider Webroot issued an automated update to its signature definitions. This inadvertently quarantined hundreds of critical customer files and applications that it erroneously flagged as malicious. At one time or another, it seems that every anti-malware endpoint security provider has fal
Publish At:2017-05-13 12:35 | Read:4409 | Comments:0 | Tags:Breaking News anti-virus file-based updates Isolation malici

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics
Publish At:2017-04-18 02:05 | Read:7112 | Comments:0 | Tags:Breaking News Threats anti-virus command control EDR Events

How and Why Small Businesses Are Investing in Cybersecurity

Businesses of all sizes are taking note that cyber threats are continually on the rise. No one is safe. In our digital world, you just can’t be too cautious when it comes to protecting your data. This is true whether your company employs 200,000 or 10 employees. Cyber criminals have no bounds. They just want to profit off of your information. That goes
Publish At:2017-01-02 01:30 | Read:4391 | Comments:0 | Tags:Cyber Security Featured Articles anti-virus Cyber Crime cybe

Fear Sells; is FUD an acceptable marketing tool?

Fear Sells; is FUD an acceptable marketing tool? Posted by Kevin on June 6, 2016.Fear sells. Fear is what makes us buy security products. If there was no fear, we wouldn’t buy them.This simple statement lies behind the ever-present question that maybe, just maybe, the security in
Publish At:2016-06-06 09:35 | Read:7499 | Comments:0 | Tags:Expert Views Kevin Townsend's opinions anti-virus

Panda Security, the tested anti-virus

Be careful! Not all anti-virus systems are what they seem and many are more hazardous than helpful for your cyber security, so was said in a recent investigation.  The investigation concluded that, today, most anti-virus’ tend to lower the threshold of Internet browser security.  Can they protect us against external threats?  How effective are they? Tradit
Publish At:2016-05-09 23:25 | Read:6210 | Comments:0 | Tags:News Panda Security anti-virus Concordia University vulnerab

Banking Protection – how does it work?

Security products are usually protecting you silently in the background. Until they encounter something malicious, that is. But there is one exception. You may have seen a banner in the upper part of the screen when visiting sites dealing with money. That’s our Banking Protection kicking in. It’s available in both Internet Security and our brand new SAFE. Le
Publish At:2016-01-05 20:45 | Read:3563 | Comments:0 | Tags:Security anti-malware anti-virus banking protection banking

4 Things to Consider When Assessing Device Posture for Effective Network Access Control

By Benny Czarny One of the main reasons to have a NAC (Network Access Control) system in place is to keep risky devices from connecting to your organization’s network. Unfortunately, simply purchasing a NAC solution is not going to guarantee your protection. You will also need to consider several other elements in addition to acquiring an NAC solution, inclu
Publish At:2015-12-15 18:10 | Read:4721 | Comments:0 | Tags:Online Security Anti-Malware anti-virus encryption endpoint

Three Reasons Why Anti-Virus Alone is No Longer Enough

So many home, and even business users, are complacent about the level of protection they are currently receiving from their traditional anti-virus (AV) software. I have real-time protection in my AV!  That’s enough, right? Nope. Not any more. The malware ecosystem has changed drastically in the past 10 years, to the point that the old precautions are j
Publish At:2015-11-11 21:00 | Read:5845 | Comments:0 | Tags:Security Threat Anti-Malware anti-virus malvertising malware

A Snapshot of Black Hat USA 2015

Last month, The State of Security shared the details of 12 intriguing talks from this year’s BSidesLV along with several security experts’ comments about why BSides, as an institution, continues to hold substantial appeal among infosec folks.Our post notes that BSidesLV, among other things, is held in Las Vegas at the same time as Black Hat USA –
Publish At:2015-09-17 13:40 | Read:4866 | Comments:0 | Tags:Cyber Security Featured Articles anti-virus automotive secur

Signatures newsflash: AV doesn’t detect what it doesn’t detect

Signatures newsflash: AV doesn’t detect what it doesn’t detect Posted by David Harley on July 20, 2015.I came across a nicely understated sideswipe at anti-malware in an article by Darren Pauli for the Register on Symantec’s report of a dramatic decline in spam levels
Publish At:2015-07-20 18:00 | Read:3859 | Comments:0 | Tags:David Harley anti-virus blacklisting Darren Pauli signatures