HackDig : Dig high-quality web security articles for hacker

Equifax hit with a data breach possibly affecting half of the US population

This Thursday Equifax, one of the three major credit bureaus in the US, announced that cyber security incident involving consumer information of nearly half of the population in the US had been spotted on July 29th, 2017. In the press release published yesterday, they stated that based on their internal investigation the data breach began taking place in mid
Publish At:2017-09-08 05:50 | Read:2788 | Comments:0 | Tags:Mobile News News companies cybersecurity urgent

Panda Security Warns of a New Phase in Cybertheft

Cybercrime is a very profitable and attractive business. This is a new phase of cyber theft that involves stealing money directly from banks, rather than from their customers, using phishing attacks to infect the computers of bank employees. The million-dollar question is: where are the largest sums of money? They are, without a doubt, in the financial insti
Publish At:2017-06-15 06:15 | Read:3562 | Comments:0 | Tags:News Panda Security adaptive defense bank ciberheists compan

Corporate email addresses receive four times more malware than personal ones

Cyber-attacks cost companies millions of euros each year. A high price to pay which, according to a study conducted by Google’s Research Team, is not only due to the growing sophistication of the strategies and tools used by cyber-crooks, but also to the huge number of threats in circulation. Researchers examined over 1 billion email exchanges via Gmai
Publish At:2017-06-12 23:00 | Read:3517 | Comments:0 | Tags:Security Adaptive Defense 360 companies Malware Phishing Spa

Keyloggers: Be careful what you type

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking t
Publish At:2017-06-09 21:20 | Read:3488 | Comments:0 | Tags:Security companies cyberattacks keyloggers technology

Panda Security at Gartner Security and Risk Management Summit

Panda Security will be attending this year’s Gartner Security and Risk Management Summit. The event, organized by IT research and advisory company Gartner, will be held in National Harbor, Maryland, United States, from June 12 -15. Panda Security will be at Booth #643, presenting the new corporate cyber-security paradigm based on Adaptive Defense. The Spanis
Publish At:2017-06-07 14:05 | Read:3615 | Comments:0 | Tags:News Panda Security adaptive defense advanced cyber-security

Corporate Cybersecurity: Keep Up, or Die

Companies are more vulnerable than ever to cyberattacks, as their CIOs will be quick to explain to anyone who cares to ask. A third of them acknowledge that their company has suffered a major cyberattack in the last two years, an increase of 45% compared to 2013. And only one in five IT managers claims to be “very well prepared” to respond to cyb
Publish At:2017-06-06 19:40 | Read:2920 | Comments:0 | Tags:Security companies cyberattacks Cybercrime gdpr

Goodbye Privacy? The US Has Recently Passed a Bill That Has Everyone Worried

 The US Congress  decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news. Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, however, required these companies to obtain permission fr
Publish At:2017-05-26 18:50 | Read:4186 | Comments:0 | Tags:Security companies data Internet Privacy

Where the leading apps keep your company’s data

The current digital economy revolves around data. Giving up our data is the price we pay for signing up for free internet services, as the companies who provide these services use this personal information in order to fine-tune ads paid for by their true clients: advertisers. Data is the Internet’s oil. Unlike this limited fossil fuel, however, data is incr
Publish At:2016-12-08 01:30 | Read:4907 | Comments:0 | Tags:News apps companies data

How to avoid bogging down your own servers

There’s been a lot of talk recently about DDoS (distributed denial-of-service) attacks in the wake of an incident that left thousands of users without internet access as a result of the collapse of the servers at Dyn, a DNS hosting service. Needless to say, we should be aware of this threat, know how it works, and how to defend ourselves against it. Especia
Publish At:2016-12-05 18:15 | Read:4296 | Comments:0 | Tags:Tips companies ddos attacks news

Anticipate the risk of your employees getting a new phone for Christmas

As we enter the Christmas period, many of your company’s employees will be deciding to change their phones in the coming months. Something as simple and seemingly harmless as a gift (or a purchase from the Black Friday sales) could actually be putting your business security at risk, especially if it encourages workers to use their own smartphones for
Publish At:2016-11-28 20:30 | Read:3897 | Comments:0 | Tags:Tips companies cybersecurity mobile devices

Malicious office printers could hijack employees’ cell phones

At first glance it is just another printer; one of those big machines that sits against the wall of thousands of offices around the country, turning blank sheets of paper into corporate documentation. And as inoffensive as it may seem, just another piece of office furniture, it can become a threat to your company’s confidentiality. While your printers and n
Publish At:2016-11-25 00:20 | Read:2965 | Comments:0 | Tags:News companies cybersecurity malicius printer

Be careful not to keep your invoices where your competitors can find them

One of the most common and most sensitive documents that companies handle on a daily basis is invoices. Issuing and receiving them is a fundamental activity for every business, however, people are not always aware of how important they are even after being paid or collected. Together or individually, they can expose critical information that can be very val
Publish At:2016-11-21 22:40 | Read:3226 | Comments:0 | Tags:News companies cybersecurity Internet invoices

Camera drones: A flying spy is peeping into your window

Drones have conquered the world: they are used to hunt down tax evaders and illegal hunters, help suppress wildfires, find victims after natural disasters… They even serve as flying cameras to assist in filming movies and for aerial photography. Online retail giant Amazon, for example, is planning on using drones for commercial delivery in order to fl
Publish At:2016-11-18 20:50 | Read:4004 | Comments:0 | Tags:Mobile Security News companies cybersecurity drones

Companies don’t take proper care of the data they store in the cloud

That hard disks, pen drives and other physical storage devices are an attractive target for cyber-criminals wanting to steal confidential information from enterprises is something that company managers are well aware of. And, in fact, they try to educate their employees about the need to use those tools properly. However, the now-popular digital cloud, used
Publish At:2016-11-15 19:10 | Read:3310 | Comments:0 | Tags:News cloud companies Malware Cloud

TrickBot, new spam campaign against companies

On November the 2nd we witnessed a new spam campaign delivering emails each with a Word document attachment targeting UK companies. Each email message had the subject “Companies House – new company complaint” and the Word document attachment was titled “Complaint.doc”. When users open the document, this is what they see: How TickBot works? If the user foll
Publish At:2016-11-08 09:15 | Read:7353 | Comments:0 | Tags:Malware Mobile News companies cybersecurity highlighted Pand


Share high-quality web security related articles with you:)


Tag Cloud