HackDig : Dig high-quality web security articles for hacker

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

This post was co-authored by Wendy Zamora and Chris Boyd. All opinions expressed belong to your mom. Back in the days before climate change stretched frigid winter months directly into the insta-sweat of summer, there was a saying about March: in like a lamb, out like a lion. The same might be said about the last decade in cybersecurity fails. What kic
Publish At:2019-12-19 16:50 | Read:378 | Comments:0 | Tags:Awareness ashley madison ashley madison hack BadRabbit cambr

Report: Organizations remain vulnerable to increasing insider threats

The latest data breach at Capital One is a noteworthy incident not because it affected over 100 million customer records, 140,000 Social Security numbers (SSNs), and 80,000 linked bank accounts. Nor was it special because the hack was the result of a vulnerable firewall misconfiguration. Many still talk about this breach because a leak of this magnitude,
Publish At:2019-12-05 16:50 | Read:423 | Comments:0 | Tags:Awareness Carnegie Mellon University cert insider threat cen

As Internet turns 50, more risks and possibilities emerge

This op-ed originally appeared in the San Francisco Chronicle on October 28, 2019. We occupy a richly-connected world. On the Internet, we collapse distance and shift time. But this Internet that delivers mail, connects us with friends, lets us work anywhere, and shop from the palm of the hand, is a mere 50 years old, slightly younger than Jennifer Anisto
Publish At:2019-11-11 23:20 | Read:379 | Comments:0 | Tags:Awareness arpanet dns domain domains history of the internet

When can we get rid of passwords for good?

Or perhaps I should have asked, “Can we ever get rid of passwords for good?” The security world knows passwords are a problem. Products ship with default passwords that are never changed. People reuse old passwords or adopt easy-to-guess passwords that hackers easily defeat via brute force. Or users simply can’t keep up with having to re
Publish At:2019-10-16 23:20 | Read:577 | Comments:0 | Tags:Awareness 2fa authentication mfa passwords

Europol: Ransomware remains top threat in IOCTA report

The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report for the year. And we weren’t surprised to find that ransomware, despite its palpable decline in volume these past few months—a trend we’ve also seen and documented—remains the most prominent threat in terms
Publish At:2019-10-14 23:20 | Read:576 | Comments:0 | Tags:Awareness bec Business Email Compromise child sexual exploit

5 Signs Your Cybersecurity Awareness Program Is Paying Off

Not too long ago, a client of ours who had just released a dynamic new cybersecurity awareness course told me how blown away he was with the response they were getting.His inbox was full of compliments, and his colleagues wanted to duplicate his training success in their own departments. He recounted how employees stopped him in the hallway to thank him for
Publish At:2017-03-29 01:05 | Read:5491 | Comments:0 | Tags:Featured Articles Security Awareness awareness cybersecurity

The Next Wave for Cybersecurity Awareness

The annual RSA Conference is a lot of things to a lot of people (43,000 this year!). For me, it’s become an annual opportunity to step out of the stream and to look back at what has happened in the last year and peer forward at what’s to come.This year, I think we have reached an inflection point around the way we as a profession treat the “human element,” a
Publish At:2017-02-27 10:30 | Read:4531 | Comments:0 | Tags:Security Awareness awareness information security

Sherlock Holmes for the InfoSec Crowd: 5 Steps to Becoming a Security Awareness Mastermind

The ever-fickle world of pop culture has seen a resurgence of interest in Sherlock Holmes in the last five years.Fresh re-imaginings of the detective residing at 221B Baker Street have come both to the big screen and small to varying degrees of critical acclaim. Robert Downey Jr.’s version premiered in 2009, while Benedict Cumberbatch’s modern interpretation
Publish At:2017-01-17 17:20 | Read:4305 | Comments:0 | Tags:Featured Articles Security Awareness awareness breach securi

Burgling From an OSINT Point of View

This is a more technology-based continuation of KGW Portland‘s story that it published discussing what 86 convicted burglars looked for in target selection. My aim is to add aspects of both Social Engineering and Open Source Intelligence (OSINT) into this to attempt to help raise awareness.The purpose behind the anonymous questionnaire, which was distr
Publish At:2016-11-17 14:50 | Read:4439 | Comments:0 | Tags:Featured Articles Security Awareness awareness OSINT social

Security Pros Not Confident in Ability to Respond to Ransomware, Reveals Survey

On July 10th, we at The State of Security published our June 2016 ransomware roundup.It was a busy month for ransomware authors. The security industry witnessed the comeback of Locky, the rebranding of CryptXXX as UltraCrypter, and the emergence of educational ransomware, among other developments. Experts also saw some variants make unusually high ransom dem
Publish At:2016-07-13 04:45 | Read:3431 | Comments:0 | Tags:Featured Articles IT Security and Data Protection awareness

NCA launched #CyberChoice campaign, to prevent youngsters become cyber criminals

The Britain’s National Crime Agency (NCA) has launched this week #CyberChoices campaign that targets parents of youngsters aged 12-15 to explain them how it is easy to be involved in cyber criminal activities. Are script kiddies a real threat? The Britain’s National Crime Agency (NCA) thinks so and launch
Publish At:2015-12-10 19:05 | Read:3013 | Comments:0 | Tags:Cyber Crime Laws and regulations Security Breaking News Cybe

Enhancing Mobility Management with Cyber Security

        Mobile devices and ubiquitous wireless connectivity have triggered a new lifestyle. We now access information anywhere, anytime as do our adversaries. You should proceed with caution! The power enabling us to do more, also makes us vulnerable to cyberattacks. We at Zimperium are playing our part in mobile safety and would like to
Publish At:2015-10-23 00:05 | Read:4224 | Comments:0 | Tags:Events Webinar Awareness Cybersecurity

Security issues in DHS systems potentially exposes confidential data at risk

Despite DHS components have strengthened coordination in performing their cyber missions a recent audit made by the OIG has found several security issues. Among the missions assigned to the DHS there is the coordination of activities related to the prevention, mitigation and recovery from cyber incidents, the Department also o
Publish At:2015-09-17 15:30 | Read:4985 | Comments:0 | Tags:Breaking News Reports Security Audit awareness cyber securit

Three UK politicians hacked while using open WiFi networks

A team of experts hacked three UK politicians while they were using unsecured WiFi networks to demonstrate the risks they are daily exposed. Public Wi-Fi networks are dangerous places for our digital identity, we have explained several times the risks related to the connections to open WiFi hotspots. Security  experts have exp
Publish At:2015-07-11 17:50 | Read:3050 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking awareness F-Sec

Escape the Echo Chamber: Educating End-Users and Non-Security People

You have secured every server, patched every bit of software, risk teams have vetted and locked down 10,000+ third-party applications, and a personal victory was won with the addition of the new canine unit added to the corporate campus lobby. Impossibly though, the news is reporting that your business assets have been exfiltrated to several competitive nati
Publish At:2015-07-08 02:10 | Read:2978 | Comments:0 | Tags:Featured Articles Security Awareness awareness cybersecurity


Share high-quality web security related articles with you:)


Tag Cloud