HackDig : Dig high-quality web security articles for hackers

Would ‘Medicare for All’ help secure health data?

DISCLAIMER: This post is not partisan, but rather focuses on risk assessment based on history and what threats we are facing in the future. We do not endorse any healthcare plan style in any way, outside of examining its data security risk. For many folks, the term ‘Healthcare for All’ brings up an array of emotions ranging from concern to happiness, and
Publish At:2019-11-26 21:50 | Read:2190 | Comments:0 | Tags:Government Privacy Security world adam kujawa AMCA American

Cybersecurity Doesn’t Just Happen, You Have to Get a Round Tuit (We Have One For You)

It’s Monday. On the West Coast, Black Hat is over and if you traveled, you should be home. If you didn’t travel, it’s still Monday and there are things to be done. And August starts tomorrow – so you might be thinking, “Bah, let’s get through August and then I’ll refocus.” Not so fast. This is a round tuit. Y
Publish At:2017-07-31 14:15 | Read:6339 | Comments:0 | Tags:Threats bbc breaches data priorities research round tuit Sec

Security Professionals Admit to Paying Ransom and Hiding Breaches (Infographic)

We did a survey at RSAC in February that kind of blew our minds; so much so we surveyed more people to check our work! Security professionals admit to paying ransom (from ransomware) and not telling anyone what they’d done. When we went more broadly – U.S. and U.K. security pros – the numbers didn’t get better (they got worse). Have
Publish At:2017-05-13 12:35 | Read:5282 | Comments:0 | Tags:Company News Threats breaches infographic Malware ransom Ran

Enterprises: Only paying attention to big-name hacks? You may be missing the point

Security professionals are more likely to pay attention to breaches if the companies being breached already have recognizable names. Seems like common sense. You see a headline that says, “Target point of sale technology hacked,” you’re much more likely to pay attention than, “Hospital in Kentucky suffers from ransomware attack.” Unless you live in Kentucky
Publish At:2016-09-21 18:05 | Read:4265 | Comments:0 | Tags:Enterprise Mobile Security Security breach fatigue breaches

Identifying Cyber Risks: The Important Role of Senior Management

It is becoming more and more evident that cybersecurity is one of the focal points regarding security risks in the twenty-first century for all organisations.It is understandable that almost every organisation that has access to any kind of computing devices will be at risk and will probably experience harmful cyber incidents. Hackers, whether via individual
Publish At:2016-08-02 00:25 | Read:9060 | Comments:0 | Tags:Connecting Security to the Business Featured Articles Risk M

TeamViewer users are being hacked in bulk, and we still don’t know how

For more than a month, users of the remote login service TeamViewer have taken to Internet forums to report their computers have been ransacked by attackers who somehow gained access to their accounts. In many of the cases, the online burglars reportedly drained PayPal or bank accounts. No one outside of TeamViewer knows precisely how many accounts have been
Publish At:2016-06-04 06:25 | Read:9867 | Comments:0 | Tags:Risk Assessment Technology Lab account takeovers breaches pa

Then there were 117 million. LinkedIn password breach much bigger than thought

Login credentials for as many as 117 million LinkedIn accounts have been put up for sale online by someone who is seeking more than $2,200 for the haul, a security researcher said.Further Reading8 million leaked passwords connected to LinkedIn, dating websiteAn unknown hacker posted the lists online and asked for help in cracking them.The credentials—which i
Publish At:2016-05-18 12:55 | Read:4677 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab breaches Linke

Security Week-in-Review: Old software, new problems

It’s hard to keep up with the hundreds of security-specific headlines published every week. So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore money-stealing malware, an SAP vulnerability from 2010, and patches. Check back every Friday to learn about the latest in securi
Publish At:2016-05-14 12:35 | Read:4806 | Comments:0 | Tags:Security breaches data breach security week in review softwa

Garbage in, garbage out: Why Ars ignored this week’s massive password breach

Earlier this week, mass panic ensued when a security firm reported the recovery of a whopping 272 million account credentials belonging to users of Gmail, Microsoft, Yahoo, and a variety of overseas services. "Big data breaches found at major email services" warned Reuters, the news service that broke the news. Within hours, other news services were running
Publish At:2016-05-07 03:10 | Read:3522 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab breaches hacks

Hand over £1 million or all your sausage are belong to us

Well, ok, not your sausages, I mean data, but with this story being about Lincolnshire County Council, I just couldn’t resist. Earlier this week, 300 of the council’s computers were infected with the same piece of malware, leaving the authority with no choice but to unplug its entire system. According to The Lincolnite, a suspected breach exposed
Publish At:2016-01-29 21:05 | Read:3955 | Comments:0 | Tags:Breaches

TalkTalk customers WalkWalk after data breach

Data breaches, though unfortunate, don’t have to signal the death knell for your business. As many companies have discovered, the fallout can be severe but, in time, recovery can be possible, as long as lessons are learned and, far more importantly, the initial incident response is sound. As any business owner or senior executive will tell you, having
Publish At:2016-01-22 08:15 | Read:3662 | Comments:0 | Tags:Breaches

Data thieves – ignore, slap on the wrist or jail?

I wrote yesterday about Onur Kopcak and the arguably draconian prison sentence he received for engaging in a spot of identity theft, concluding (in my own mind, if not on the screen, that he may have been treated a tad harshly). I also made reference to the fact that British data thieves seem to get off rather lightly, an impression only enhanced when I read
Publish At:2016-01-13 07:15 | Read:3909 | Comments:0 | Tags:Breach Disclosure Breaches ISO 27001 Security Awareness

Potential Livestream breach – payment details safe but PII may have been swiped

Live video streaming platform Livestream – which has partners including the BBC, Spotify, Nike, Nasdaq and Tesla – has alerted its customers to a potential data breach which may have exposed personal information including names, email addresses, phone numbers, dates of birth and encrypted passwords. In an email sent out to its customers the compa
Publish At:2015-12-24 17:05 | Read:7218 | Comments:0 | Tags:Breaches

Do Healthcare Breaches Undermine Trust?

In the spring of 2014, the Federal Bureau of Investigations sent out a private notice to healthcare providers warning them that as a result of lax security controls in their field, the healthcare industry as a whole was more prone to “cyber intrusions” than the financial and retail sectors.Unfortunately, this threat has not changed in the past y
Publish At:2015-12-23 12:40 | Read:5758 | Comments:0 | Tags:Featured Articles IT Security and Data Protection breaches D

Credit card details safe but personal info swiped in JD Wetherspoon breach

Another day… another… yeah, you guessed it… breach. This time around its UK pub chain JD Wetherspoon (note to self: alcohol is evil). According to the Guardian, over half a million customers of the drinking establishment have had their personal information swiped after an old website it ran was hacked. Though Wetherspoon says “extreme
Publish At:2015-12-05 21:00 | Read:3550 | Comments:0 | Tags:Breaches


Tag Cloud