HackDig : Dig high-quality web security articles for hackers

How CISOs Can Foster Effective Comms and Build a Cybersecurity Program

For many organizations, security flows from the top down. That’s a problem when executives don’t emphasize security as much as they should. Cisco learned as much in its CISO Benchmark Study “Securing What’s Now and What’s Next 20 Cybersecurity Considerations for 2020.”Here are just some of the findings from Cisco’s study:A majority (89%) of respo
Publish At:2020-09-30 12:20 | Read:171 | Comments:0 | Tags:Featured Articles IT Security and Data Protection CISOs comm

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more so than your Average Joe. Whether a reporter is trying to crowd-source information without revealing their story or operating in a country where freedom of the press is a pipe dream, cybersecurity plays an important role for any journ
Publish At:2019-11-11 23:20 | Read:1405 | Comments:0 | Tags:How-tos communication data eavesdropping encrypted journalis

5 Tips to Get an “A” on Research Papers & Advance Your Infosec Career

John Callahan’s October article “4 Reasons to Get Your Masters in Cyber Security” made me think about how to help students and cyber professionals strengthen a critical soft skill: written communication.Research synthesis and analysis papers are common in academic environments. These critical thinking assignments require students to conduct research on speci
Publish At:2017-01-12 08:25 | Read:5219 | Comments:0 | Tags:Off Topic academic browser communication Infosec Patching se

4 People who can see what Porn you Watch, and 4 Tips to Stop it

In the grand scheme of things, there certainly are more important facets to online privacy than keeping one’s porn habits private (government overreach, identity theft, credit card fraud to name a few). However, adult browsing histories are one of the secrets in their online lives people want to protect the most, so it might be disconcerting to know that por
Publish At:2016-06-04 21:20 | Read:3966 | Comments:0 | Tags:Privacy Web communication encryption freedome Internet priva

Slovenian hacker who reported issues in Tetra Protocol gets prison sentence

A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence. Ethical hacking could be very risky, this is the experience of a 26-year-old Slovenian student, Dejan Ornig, that had serious problems after the discovery of flaws in the Police Communications Protocol. It is incredible, but authoritie
Publish At:2016-05-23 06:20 | Read:5237 | Comments:0 | Tags:Breaking News Hacking Laws and regulations Communication enc

Anonymity is not Just for Criminals – 3 legit Reasons to Hide your Tracks Online

  In 1853 a strange new invention appeared in the English cityscape, and caused a small wave of moral outrage among Victorians. This perceived threat to social order was not a new drug, political movement or saucy romance novel, but the seemingly harmless letter box. One reason was the shocking development of women now being able to post letters without
Publish At:2016-05-21 10:35 | Read:3475 | Comments:0 | Tags:Privacy communication freedome Internet tracking mass survel

VIDEO: Mikko Hypponen at World Press Freedom Day

Today is World Press Freedom Day – a day created by UNESCO in recognition of the importance of free speech, as well as the important role journalists play in using this right to help inform citizens about what’s going on with the world around them. This year’s main event is being held in Helsinki, Finland, and co-hosted by the Finnish government. There was l
Publish At:2016-05-03 22:50 | Read:4449 | Comments:0 | Tags:Privacy Security Mikko Hypponen F-Secure privacy Internet su

WhatsApp is now secure by default – Why is it so important?

WhatsApp is not just any messaging app. It’s a quite unique combination of popularity and security. Many people know it as “the” messaging app. A natural choice that all your friends are using already, so it’s a no-brainer for you to use it too. But WhatsApp is also committed to provide a secure solution. They have been working with Whisper Systems for a lon
Publish At:2016-04-06 21:50 | Read:5104 | Comments:0 | Tags:Mobile Privacy Security chat communication crypto e2e encryp

The Danish Government Was Wise to Back Off ‘Session Logging’ – Here’s What It Should Do Instead

Denmark has taken a smart step back and has an opportunity to take an even smarter step forward. The government’s plan to bring back “session logging” after ditching the practice in 2014 would have been a wasteful venture into mass surveillance with a justification that never made sense. Officials were wise to pause for a few months to consider the tech
Publish At:2016-03-29 13:50 | Read:4455 | Comments:0 | Tags:Privacy Security communication F-Secure Internet privacy spy

We need more than just age limits to protect our children in social media

The European Union is preparing a new data protection package. It is making headlines because there are plans to raise the age limit for digital consent from 13 to 16 years. This has sometimes been describes as the age limit for joining social media. To be precise, member states could choose their age limit within this range. Younger kids would need parental
Publish At:2015-12-17 06:35 | Read:3493 | Comments:0 | Tags:Family Protection Privacy Social media child children commun

Backdoors in messaging apps – what’s really going on?

We are in one of those phases again. The Paris attacks caused, once again, a cascade of demands for more surveillance and weakening of encryption. These demands appear every time, regardless of if the terrorists used encryption or not. The perhaps most controversial demand is to make backdoors mandatory in communication software. Encryption technology can be
Publish At:2015-12-15 00:20 | Read:4358 | Comments:0 | Tags:Privacy Security anti-terrorism backdoor chat communication

The Security Hypocrisy Conundrum

This year’s Cyber Awareness Month has once again, seen some great articles, tips and practical advice that we can share with our colleagues, friends, family and children.Actively encouraging a positive security aware culture is a vital part of what we do as security professionals, and we should always be seen to be setting the right example; shouldn’t we?I t
Publish At:2015-10-30 08:40 | Read:3994 | Comments:0 | Tags:Featured Articles Security Awareness communication passwords

Could you get fired like Marty McFly in Back to the Future 2?

Many people have fond memories of the Back to the Future saga – a series of movies chronicling the adventures of Marty McFly through time. In the three films, he uses a time machine to travel to various points in the past and future, encountering various challenges that he must overcome in order to return to his correct time of 1985. In the second film, he t
Publish At:2015-10-21 21:05 | Read:3956 | Comments:0 | Tags:Privacy Social media communication F-Secure Internet passwor

Only 10% protected – Interesting study on travelers’ security habits

Kaisu who is working for us is also studying tourism. Her paper on knowledge of and behavior related to information security amongst young travelers was released in May, and is very interesting reading. The world is getting smaller. We travel more and more, and now we can stay online even when travelling. Using IT-services in unknown environments does howeve
Publish At:2015-08-24 21:20 | Read:4073 | Comments:0 | Tags:Mobile Phone Security Social media cellphone communication I

What Clicking Tells Online Trackers

The Internet is first and foremost a communication medium. Every link that people click, every character they enter, and every video they watch involves an exchange of information. And it’s not just a two-way conversation between a person and their computer, or a person and someone they’re chatting with. There’s more people than listening in, and because com
Publish At:2015-05-15 16:50 | Read:4180 | Comments:0 | Tags:Privacy communication data collection digital F-Secure Inter


Tag Cloud