HackDig : Dig high-quality web security articles for hackers

Google Maps: online interventions with offline ramifications

The places where online life directly intersection with that lived offline will be forever fascinating, illustrated perfectly through a recent performance piece involving Google Maps, a cart, and an awful lot of mobile phones. Simon Weckert, an artist based in Berlin, Germany, showed how a little ingenuity could work magic on the ubiquitous Google Maps syste
Publish At:2020-02-07 16:50 | Read:499 | Comments:0 | Tags:Privacy art vs tech businesses cars crowdsourcing Google goo

The Three Primary Regulatory Changes of the GDPR

The recent increase in number and impact in cyberattacks to steal information has made it necessary to change the legislation on data protection in Europe. The GDPR (General Data Protection Regulation), which will be implemented in May 2018, aims to protect the data of European citizens and monitor how organizations process, store and use this data. Broadly
Publish At:2017-08-28 23:45 | Read:3511 | Comments:0 | Tags:Security b2b businesses gdpr

CEOS are the Biggest Risk to the Mobile Security of Companies

The benefits of having always-connected employees are palpable. However, it is a considerable challenge for corporate security managers, who have to make sure that constant access to company data from any location does not pose a risk to the company. In fact, 92% say they are concerned about the security challenges posed by a growing mobile workforce, accord
Publish At:2017-06-20 15:10 | Read:3723 | Comments:0 | Tags:Panda Security businesses CEOs Mobile Security

Default Configuration = Insecure Configuration

A piece of advice: never keep the default settings on your devices or networks. This should be rule number one when starting up a device or when installing a wifi network in your company. The initial configuration of devices, networks, or software is aimed at usability rather than security, but this trade-off comes at a great risk. By taking the easy route a
Publish At:2017-06-19 20:45 | Read:4277 | Comments:0 | Tags:Security businesses default settings security

China’s New Cyber Security Law Will Affect the Rest of the World

As the new Cyber Security Law (CSL) comes into force June 1, more details of regulations are coming to light that will affect no small number of companies around the world who wish to do business with China. Every one of them should radically change their way of operating in China, especially as regards the processing of their customers’ data. Although
Publish At:2017-05-30 14:55 | Read:4111 | Comments:0 | Tags:News businesses china cyber security law

Ransomware Cyber-Insurance: a Rising Trend in Businesses

Ransomware is increasingly common, is evolving, and, to complicate matters, no longer only affects computers. This form of malware that thrives on encrypting data for a ransom paid in cryptocurrency also affects smartphones, TVs and any other connected device. As the price of ransoms soar (in some cases, it has already reached into the millions), it’s beginn
Publish At:2017-05-08 14:25 | Read:3781 | Comments:0 | Tags:Business businesses cyber-insurance Ransomware

What Size Companies Do Hackers Target?

Cybercriminals are after any size company that has access to people’s information. Over the last few years, we have seen so many news about stolen data information from large enterprises and agencies such as Yahoo, LinkedIn, CIA, and Google. However, these are not the real victims of the cyber-attacks. According to the recently released 2016 State of SMB Cyb
Publish At:2017-05-04 18:20 | Read:3404 | Comments:0 | Tags:Business businesses Hackers

Creepy? Maybe, but Employee Monitoring is Saving Companies Money

The practice of employee monitoring in the workplace has been evolving and is increasingly present in companies. As of this writing, 15% of companies on the prestigious Fortune 500 list have equipped their offices with tiny sensors created by the company Enlighted, which are used to find out how much time a worker spends at his or her desk, and also the time
Publish At:2017-03-28 18:15 | Read:3880 | Comments:0 | Tags:Technology businesses employee monitoring savings

The Apps That Most Frequently Appear on Companies’ Blacklists

Apps installed on smartphones and tablets are considered to be one of the biggest risks for companies today. And for good reason. In addition to diminishing the performance of the devices themselves, they can become the gateway to mobile and corporate tablets for cybercriminals. Because of this, IT departments should be wary of employees downloading certain
Publish At:2017-03-24 03:45 | Read:3933 | Comments:0 | Tags:Security apps businesses devices

The Dangers of Using an Old Android are Real for Everyone (Even the President)

The presidency of Donald Trump kicked off with some controversy in the area of ​​cybersecurity. The NSA modified the BlackBerry of his predecessor, Barack Obama (who ended up having to part with it for security reasons), the new leader of the United States seems to be less concerned about the vulnerabilities of mobile devices and continues to use an old Andr
Publish At:2017-02-21 00:00 | Read:4131 | Comments:0 | Tags:Security Android businesses trump

Access Cards Will Disappear from 20% of Offices within Three Years

  You arrive at the office, you approach the security gates, you swipe your card and start the day. It’s one of the motions that a large percentage of the workforce goes through daily, because today, and it seems that for a while yet, the access card is still the reigning security device for entering corporate offices. By 2016, less than 5% of organizat
Publish At:2017-02-14 20:25 | Read:3321 | Comments:0 | Tags:Security access cards businesses smartphones

How to Distribute Your Technology Budget

The new European General Data Protection Regulations came into effect on 25 May, although countries and institutions have a period of two years to prepare for their final implementation. Given this situation, and to comply with the requirements of the standard, one would hope for companies to increase their investment in computer security. However, the scena
Publish At:2017-02-14 02:00 | Read:3633 | Comments:0 | Tags:Security businesses gartner security budget

Only 3% of the Apps on Your Company iPhones are Secure

Since the 1st of January, the iPhones in your mobile device fleet are even more secure. Or, at least, they should be based on Apple’s most recent requirements for developers. With the beginning of the new year, all apps that haven’t incorporated the App Transport Security (ATS) function will be unable to offer updates through the official store. With the ATS
Publish At:2017-02-01 18:55 | Read:3724 | Comments:0 | Tags:Security apps businesses iOS

Chatbots Take Businesses By Storm

They’re not human, but they sure seem like they are when we chat with them. Chatbots will become virtual butlers of many companies thanks to their ability to process natural language. Companies like Facebook are promoting their use. For the last few months, Facebook has allowed third parties to create bots for its Messenger app. Slack, Telegram, and Line hav
Publish At:2017-02-01 00:30 | Read:2738 | Comments:0 | Tags:Security businesses chatbots security

Doxware, the Scary New Evolution of Digital Hijacking

Ransomware is one of the most frequent forms of cyberattack that a company can face. Through an infected email or by some other means, criminals can lock a computer, encrypt files, or sequester an entire corporate network. The main goal: ransom money, usually in the form of cryptocurrency, in exchange for freeing up the virtually hijacked computer or mobile
Publish At:2017-01-27 10:00 | Read:3421 | Comments:0 | Tags:Security businesses doxware Ransomware security


Share high-quality web security related articles with you:)


Tag Cloud