HackDig : Dig high-quality web security articles for hacker

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How m
Publish At:2017-10-21 16:25 | Read:2664 | Comments:0 | Tags:Threats access points application attack vector endpoint End

Taking a Look at the Real British Social Engineers

I have a love/hate affair with the term ‘Social Engineer.’ To me, this is the most professional and committed ‘job’ I have ever had. It has required training and endless education, and it has changed my life in nearly every aspect.But for some, the term is used for when a free warranty deal is obtained or a loved one is tricked into exposing a secret.Take a
Publish At:2015-06-16 15:25 | Read:2851 | Comments:0 | Tags:Cyber Security Featured Articles attack vector Britan Dirty

Cisco 2015 Annual Security Report: Java on the Decline as Attack Vector

As recently as 2013, vulnerabilities involving Java appeared to be a favored tool of adversaries: Java was easy to exploit and, and exploits involving the programming language were difficult to detect. However, as reported in the Cisco 2015 Annual Security Report, Java is losing its front-runner position as a favored tool of bad actors looking to breach netw
Publish At:2015-02-03 19:35 | Read:2970 | Comments:0 | Tags:Security 2015 annual security report attack vector java JRE


Share high-quality web security related articles with you:)


Tag Cloud