HackDig : Dig high-quality web security articles for hackers

Google Chrome wants to fix your unsafe passwords

Most security breaches are the result of one thing: sloppy password practices. Too many people make the mistake of choosing weak passwords, or reusing passwords that they have used elsewhere on the internet – making life too easy for malicious hackers trying to gain unauthorised access.So I was pleased to see Google announce that over the coming weeks
Publish At:2021-01-21 09:00 | Read:109 | Comments:0 | Tags:Cyber Security IT Security and Data Protection Google Google

Five Things Security and Development Teams Should Focus on in 2021

As we say goodbye to 2020 and spend time reflecting on the industry changes, reassess our workflows and procedures in order to identify where 2021 will bring us, it’s a brilliant time to also address our security practices and ways we can bring improvement to those, as well.After considering the top challenges I saw with development teams and security teams
Publish At:2021-01-21 00:02 | Read:117 | Comments:0 | Tags:Cyber Security Documentation Security by Design training sec

U.S. National Cybersecurity Plan Promises to Safeguard Maritime Sector

The U.S Government released on January 5, 2021, a cybersecurity plan to secure the nation’s maritime sector against cybersecurity threats that could endanger national security.The Maritime Cyber EnvironmentWith International Maritime Organization’s (IMO) mandate “to ensure that cyber risks are appropriately addressed in existing safety management system
Publish At:2021-01-19 01:14 | Read:132 | Comments:0 | Tags:Cyber Security maritime maritime security planning United St

The Changing Dynamics of Cyber Insurance

Almost exactly a year ago, cybersecurity professionals were locked in a heated debate about insurance. While some were keen to point out that the future of the industry would need to include some form of insurance market, others argued that cyber insurance would never be worth the premiums, especially given the inherently volatile nature of cybersecurity.The
Publish At:2021-01-18 01:50 | Read:131 | Comments:2 | Tags:Cyber Security Cyber Insurance cyber liability insurance cyb

It’s Always DNS – But Not in the Way You May Think

A popular joke among technologists says that it’s always DNS, even when it initially didn’t seem that way. DNS issues come in many shapes and forms, including some often-overlooked security issues.DNS (short for the Domain Name System) continues to be described as “the phonebook of the Internet,” but many people, including most readers of this blog, will be
Publish At:2021-01-11 02:08 | Read:258 | Comments:0 | Tags:Cyber Security DNS Domain Name System HTTPS Network Security

Ghidra 101: Slice Highlighting

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively.In this post,
Publish At:2021-01-07 00:38 | Read:184 | Comments:0 | Tags:Cyber Security IT Security and Data Protection Ghidra slice

The 10 Most Common Website Security Attacks (and How to Protect Yourself)

Every website on the Internet is somewhat vulnerable to security attacks. The threats range from human errors to sophisticated attacks by coordinated cyber criminals.According to the Data Breach Investigations Report by Verizon, the primary motivation for cyber attackers is financial. Whether you run an eCommerce project or a simple small business website, t
Publish At:2020-12-21 03:02 | Read:327 | Comments:0 | Tags:Cyber Security Featured Articles threat web application atta

Ghidra 101: Cursor Text Highlighting

In this blog series, I will be putting the spotlight on useful Ghidra features that you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective while reverse engineering. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively.What is Cursor Text
Publish At:2020-12-08 03:02 | Read:256 | Comments:0 | Tags:Cyber Security Ghidra text highlighting

‘Scariest iPhone Hack Ever’ Illustrates Importance of Protecting Mobile Devices

It’s been called the ‘scariest iPhone hack ever.’ According to a recent Ars Technica article, “Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device – over Wi-Fi, with no user interaction required at a
Publish At:2020-12-04 10:21 | Read:217 | Comments:0 | Tags:Mobile Security advanced mobile threat defense cyber securit

How to Protect Your Business From Multi-Platform Malware Systems

The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown individuals. According to the United States Federal Bureau of Investigations, the group is a North Korean “state-sponsored hacking organization.”However, some believe that their connections to North Korea might be a false flag intending to hide the
Publish At:2020-12-03 02:08 | Read:270 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Lazarus malware

7 essential tips to stay safe shopping online, Cyber Week and all year

Shopping online can be a convenient way to get through your holiday shopping list, but just as in the physical world, there are precautions every online shopper should take to protect personal and financial information.For the most part, shopping online is safe—that is, if you use familiar, reputable websites. But sometimes in order to find that perfect gift
Publish At:2020-12-01 05:44 | Read:304 | Comments:0 | Tags:Security & Privacy Black Friday Cyber Monday cyber security

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible
Publish At:2020-11-30 00:02 | Read:329 | Comments:0 | Tags:Cyber Security Featured Articles IoT IoT security WiFi hack

Lessons From Teaching Cybersecurity: Week 8

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python ai
Publish At:2020-11-24 03:38 | Read:403 | Comments:0 | Tags:Cyber Security Featured Articles basics careers foundational

SEC’s Office of Compliance Inspection and Examinations Warns of a Sudden Increase in Credential Stuffing Hack

Recently, the Securities and Exchange Commission’s exam division issued a Risk Alert (the “Alert”) where it carried out several targeted cybersecurity investigations. The agency is now concerned with how there’s been an increase in a specific type of hack known as “credential stuffing.“This cyberattack involves using stolen credentials to log into web-based
Publish At:2020-11-16 00:37 | Read:328 | Comments:0 | Tags:Cyber Security Featured Articles credential stuffing Cyberat

Lessons from Teaching Cybersecurity: Week 6

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python ai
Publish At:2020-11-09 12:37 | Read:342 | Comments:0 | Tags:Cyber Security teaching toolkit tools training security cybe

Tools

Tag Cloud