HackDig : Dig high-quality web security articles for hacker

‘Tis the Season for Cybersecurity: Stay Protected This Holiday Season

It’s beginning to look a lot like the holiday season – and with the holidays comes various opportunities for cyber-scrooges to exploit. While users prepare for the festivities, cybercriminals look for opportunities to scam holiday shoppers with various tricks. To shed more light on how these crooks are putting a damper on user’s holiday season, McAfee survey
Publish At:2019-12-06 16:45 | Read:499 | Comments:0 | Tags:Consumer Threat Notices mobile security computer security em

7 Ways to Wreck a Cybercrook’s Holidays

’Tis the season for giving and who better to give a giant headache to than the digital scammers working overtime to wreck our holidays? Can we spot and unravel every scam out there? Probably not. But, by taking a few minutes to get equipped to click, we can dodge common traps laid by cybercrooks and wreck their holidays before they get a chance to wreck ours
Publish At:2019-12-06 16:45 | Read:592 | Comments:0 | Tags:Family Safety cybercrime identity theft malware computer sec

Here’s What You Need to Know About Your Data Privacy in 2020

The end of 2019 is rapidly approaching, and with the coming of a new year comes the perfect opportunity to reflect on the past and plan for the months ahead. What will 2020 bring when it comes to cybersecurity and what can users do to ensure that they’re protected in the upcoming year? From new data privacy laws to how organizations collect and store user da
Publish At:2019-12-06 16:45 | Read:320 | Comments:0 | Tags:Consumer Threat Notices computer security data protection in

What You Need to Know About the Google Chrome Vulnerabilities

While you might have been preoccupied with ghosts and goblins on Halloween night, a different kind of spook began haunting Google Chrome browsers. On October 31st, Google Chrome engineers issued an urgent announcement for the browser across platforms due to two zero-day security vulnerabilities, one of which is being actively exploited in the wild (CVE-2019-
Publish At:2019-11-11 23:20 | Read:177 | Comments:0 | Tags:Consumer Threat Notices computer security cybersafety cybers

A Cybersecurity Horror Story: October’s Creepiest Threats and How to Stay Secure

Halloween time is among us and ghosts and goblins aren’t the only things lurking in the shadows. This past month has brought a variety of spooky cyberthreats that haunt our networks and devices. From malicious malware to restricting ransomware, October has had its fair share of cyber-scares. Let’s take a look at what ghoulish threats have been leading
Publish At:2019-10-28 16:45 | Read:544 | Comments:0 | Tags:Consumer Threat Notices computer security cybersafety cybers

Aussies Fear Snakes, Spiders and Getting Hacked

Fears and phobias. We all have them. But what are your biggest ones? I absolutely detest snakes but spiders don’t worry me at all. Well, new research by McAfee shows that cybercriminals and the fear of being hacked are now the 5th greatest fear among Aussies. With news of data breaches and hacking crusades filling our news feed on a regular basis, many of us
Publish At:2019-10-02 11:20 | Read:604 | Comments:0 | Tags:Consumer Identity Protection computer security cybercrime cy

5 Digitally-Rich Terms to Define, Discuss with Your Kids

Over the years, I’ve been the star of a number of sub-stellar parenting moments. More than once, I found myself reprimanding my kids for doing things that kids do — things I never stopped to teach them otherwise. Like the time I reprimanded my son for not thanking his friend’s mother properly before we left a birthday party. He was seven when his
Publish At:2019-09-28 23:20 | Read:1003 | Comments:0 | Tags:Family Safety #BeCyberSmart #CyberAware Be Internet Awesome

3 Things You [Probably] Do Online Every Day that Jeopardize Your Family’s Privacy

Even though most of us are aware of the potential risks, we continue to journal and archive our daily lives online publically. It’s as if we just can’t help it. Our kids are just so darn cute, right? And, everyone else is doing it, so why not join the fun? One example of this has become the digital tradition of parents sharing first-day back-
Publish At:2019-09-19 23:20 | Read:724 | Comments:0 | Tags:Family Safety #CyberAware app safety computer security cyber

Information Security, Cybersecurity, IT Security, Computer Security… What’s the Difference?

Information security, cybersecurity, IT security, and computer security are all terms that we often use interchangeably. I know that I do.I’ve written a lot about those areas for the past several years. I notice that sometimes I switch between the terms in an article simply to avoid repeating the same phrases over and over again in my prose.Very often,
Publish At:2017-03-08 04:10 | Read:3963 | Comments:0 | Tags:Featured Articles Off Topic computer security cybersecurity

Harmful prefetch on Intel

By Enrique NissimWe've seen a lot of articles and presentations that show howthe prefetch instruction can be used to bypass modern OS kernel implementationsof ASLR. Most of the public work however only focuses on getting base addressesof modules with the idea of building a ROP chain or maybe patching somepointer/value of the data section. This post rep
Publish At:2017-01-25 07:35 | Read:4933 | Comments:0 | Tags:computer security computer threat Enrique Nissim hacker hack

Tales from Ransomwhere

Last week, Pandalabs received a question about a specific family of ransomware that was using PowerShell, a Microsoft tool that is included in Windows 10 and that has been abused by cybercriminals for some time. We get these questions every now and then, we find those questions amusing as we consider ourselves the best ones stopping ransomware attacks. But
Publish At:2016-07-15 23:20 | Read:4558 | Comments:0 | Tags:Panda Security computer security news Ransomware

“Android-specific ransomware and mobile banking Trojans are issued around the world”- Paul Chung

If there is something that stands out from my +17 years in the security field, it is the bright people I’ve met from all over the globe, that protect users from the cyber-attacks threatening us every day. In this new section, I am going to interview people from different parts of the world, who will tell us about their experiences and perspectives in
Publish At:2016-07-14 10:40 | Read:3381 | Comments:0 | Tags:Panda Security ahnlab computer security interview invited gu

Software Reverse Engineering Process: Basics and Some Explanations

Software reverse engineering is frequently mentioned in several contexts, including many illegal activities. What does it mean? Software reverse engineering is frequently mentioned in the context of illegal activity: the stealing of IP, fraud with software licenses, and so forth. At the same time, reversing has legal applications, the most known of which is
Publish At:2016-04-23 14:35 | Read:3293 | Comments:0 | Tags:Breaking News Hacking Security computer security Software Re

The Death of the Full Stack Developer

When I got started in computer security, back in 1995, there wasn’t much to it — but there wasn’t much to web applications themselves. If you wanted to be a web application developer, you had to know a few basic skills. These are the kinds of things a developer would need to build a somewhat complex website back in the day: ISP/Service Provide
Publish At:2015-08-28 14:30 | Read:3334 | Comments:0 | Tags:Industry Observations Technical Insight Vulnerabilities Web

The Scan: Security Starts at Home

Hey guys! I’m Bradi, this is the Scan. As a parent myself, I know how hard it can be to make sure you kids are being safe online; here are some great ways to stay hip to their jive. Because when it comes to teenagers, asking never works. e-Parenting Made EZ  Despite what they may think, teenagers don’t know everything – especially when it comes to cybersecur
Publish At:2015-02-02 23:15 | Read:2367 | Comments:0 | Tags:SMB computer security cybersafety online safety protecting k

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud