HackDig : Dig high-quality web security articles for hacker

Fresh Phish. (So Many Puns, So Little Time.)

Today’s phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected! Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails. I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly mimics the invoice emails from a fairly sig
Publish At:2017-05-23 12:10 | Read:3352 | Comments:0 | Tags:Threats apps attachments browsing files humans Isolation Mal

The Apps That Most Frequently Appear on Companies’ Blacklists

Apps installed on smartphones and tablets are considered to be one of the biggest risks for companies today. And for good reason. In addition to diminishing the performance of the devices themselves, they can become the gateway to mobile and corporate tablets for cybercriminals. Because of this, IT departments should be wary of employees downloading certain
Publish At:2017-03-24 03:45 | Read:2955 | Comments:0 | Tags:Security apps businesses devices

The Dark Side of Shopping Apps

Are shopping apps safe? As we shoppers get better at identifying scams, cybercriminals are having to create new ways to try and steal our money. Effective PC security tools like Panda Safe Web can identify and block fake websites before scammers have a chance to trick us. But increasingly we are shopping from our smartphones and tablets instead of desktop PC
Publish At:2017-03-16 11:10 | Read:2785 | Comments:0 | Tags:Mobile News Mobile Security apps tips

The Ten Apps that Bog Down Performance on Android Smartphones

The Android operating system is the undisputed king of smartphones. According to the latest data from Kantar Media, Android continues to enjoy a solid lead in market share. Companies and individual users alike are turning to Android as their principal OS for their devices. Despite the success of this operating system, we have all complained about our smartph
Publish At:2017-02-08 16:45 | Read:2754 | Comments:0 | Tags:Tips Android apps mobile devices

Only 3% of the Apps on Your Company iPhones are Secure

Since the 1st of January, the iPhones in your mobile device fleet are even more secure. Or, at least, they should be based on Apple’s most recent requirements for developers. With the beginning of the new year, all apps that haven’t incorporated the App Transport Security (ATS) function will be unable to offer updates through the official store. With the ATS
Publish At:2017-02-01 18:55 | Read:2681 | Comments:0 | Tags:Security apps businesses iOS

Using Fallible Static Code Analysis to Secure Apps

Back in my younger days, I used to create apps for platforms like iOS, Android and yes, even Blackberry. Mostly, this was a hobby to fill a need which was being met by the infant app stores at the time.My primary concern wasn’t security, proper development techniques, or any of the other best practices found in the OWASP Top 10. It’s safe to say that there a
Publish At:2017-01-19 06:10 | Read:2997 | Comments:0 | Tags:Cyber Security Featured Articles Android apps development se

Where the leading apps keep your company’s data

The current digital economy revolves around data. Giving up our data is the price we pay for signing up for free internet services, as the companies who provide these services use this personal information in order to fine-tune ads paid for by their true clients: advertisers. Data is the Internet’s oil. Unlike this limited fossil fuel, however, data is incr
Publish At:2016-12-08 01:30 | Read:4298 | Comments:0 | Tags:News apps companies data

iOS, Android Apps Found Leaking User Privacy Data, Researchers Say

Security researchers are warning of a rise in mobile apps leaking user privacy data, including device metadata, location and personally identifiable information (PII).In a new report analyzing mobile privacy trends, researchers at Zscaler revealed both Android and iOS users could be left vulnerable to targeted denial-of-service attacks, phishing and even phy
Publish At:2016-10-25 21:50 | Read:3585 | Comments:0 | Tags:Latest Security News Android apps iOS mobile Privacy Zscaler

As strong as your weakest link: A look at application vulnerability

When it comes to patching and updating software vulnerabilities, operating systems and web browsers seem to get all the love. But in reality, vulnerabilities in those two types of software usually account for a minority of the publicly disclosed vulnerabilities published in the National Vulnerability Database (NVD), the U.S. government’s repository of standa
Publish At:2016-09-07 05:20 | Read:3405 | Comments:0 | Tags:Cybersecurity apps Microsoft Security Intelligence Report Vu

Be a Better Friend to the Environment with These Five Apps…

Though we often speak of electronic waste and the darker side of technology, whose insatiable energy consumption is causing serious harm to the environment, we can actually use technology for good. It’s possible for the internet and our Smartphones to be environmentally friendly.   This Sunday, June 5th, we celebrate World Environment Day. We wan
Publish At:2016-06-03 07:25 | Read:3555 | Comments:0 | Tags:Technology apps Panda Security world environment day

Android will replace passwords with trust scores by 2017

Daniel Kaufman announced that Google is planning to make password identifications outmoded by 2017 and replace them with trust scores. Google wants to replace traditional passwords on Android with “trust scores,”  and it is planning to do it by 2017. The announcement was officialized at the Google I/O conference, the IT giant intends to use Google’s Tr
Publish At:2016-05-25 13:05 | Read:3169 | Comments:0 | Tags:Breaking News Mobile Security Android Apps authentication Go

Tips to help protect your professional Apps

Smartphones have become vital to our existence, accompanying us in our day-to-day lives, both at work and at home. Since May 1st is International Workers’ Day, we are celebrating by reviewing some of the top applications we believe are most useful for our professional success. “Top” Apps for professionals These app icons saturate our phone scre
Publish At:2016-04-29 07:55 | Read:3891 | Comments:0 | Tags:News Panda Security apps businesses International Workers Da

“Exclusive” Fallout 4 iOS Release Banished to the Wasteland

Online marketplaces such as Google Play and Apple’s App Store have various checks in place to ensure rogue / fake apps don’t slip through the cracks, but you can’t stop them all. Sure enough, here’s one which came crashing into, er, number 105 with a vengeance: Fallout 4 – Biohazard, priced at $6.99. Fallout 4 is currently sell
Publish At:2016-03-22 18:05 | Read:3847 | Comments:0 | Tags:Fraud/Scam Alert app apps fallout 4 falout iOS store IOS

“Huge” number of Mac apps vulnerable to hijacking, and a fix is elusive

Camtasia, uTorrent, and a large number of other Mac apps are susceptible to man-in-the-middle attacks that install malicious code, thanks to a vulnerability in Sparkle, the third-party software framework the apps use to receive updates.The vulnerability is the result of apps that use a vulnerable version of Sparkle along with an unencrypted HTTP channel to r
Publish At:2016-02-09 15:55 | Read:2897 | Comments:0 | Tags:Infinite Loop Risk Assessment Technology Lab apps exploits M

Twitter App on iOS nags users for Photos Access

Twitter App on iOS nags users for Photos Access Posted by Alexander Hanff on January 28, 2016.Earlier this week I was in Brussels talking about Privacy at the European Parliament – which is nothing unusual, especially as today is Data Privacy Day and this week is often referred t
Publish At:2016-01-29 04:10 | Read:3065 | Comments:0 | Tags:Alexander Hanff News_privacy Apps data protection iOS privac


Share high-quality web security related articles with you:)


Tag Cloud