HackDig : Dig high-quality web security articles for hacker

Consumerization: a better way to answer cybersecurity challenges

A version of this article originally appeared in Forbes on February 12, 2020. Consumerization: The specific impact that consumer-originated technologies can have on enterprises. Gartner More and more, enterprises are coming to understand that they need to adopt the agile processes and product strategies of startups in order to compete in today’s m
Publish At:2020-03-25 14:34 | Read:222 | Comments:0 | Tags:Opinion business cyberattacks business cyberthreats consumer

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Healthcare cybersecurity attacks are on the rise. As Protenus notes, industry data breaches increased by 48 percent between 2018 and 2019, with more than 41 million patient records compromised. Meanwhile, according to the 2019 HIMSS Cybersecurity Survey, 82 percent of hospitals said they suffered a “significant security incident” in the past 12 m
Publish At:2020-03-09 11:15 | Read:232 | Comments:0 | Tags:Healthcare Risk Management Artificial Intelligence (AI) Cybe

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

2019 was a tough year for the overall cybersecurity of state and local governments and municipal institutions. If you follow security news, there were times when not a week would go by without word of how the latest municipal cyberattacks impeded or even halted day-to-day operations. This stream of recent hacking incidents targeting government and municipal
Publish At:2020-02-21 13:22 | Read:388 | Comments:0 | Tags:Data Protection Government Cyberattacks Data Breach Healthca

What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders

The recently published IBM X-Force Threat Intelligence Index 2020 pointed out that over 8.5 billion records were compromised in 2019, a figure that’s more than 200 percent greater than the number of records lost in 2018. It also determined that scanning and exploitation of vulnerabilities have increased from just 8 percent of attacks in 2018 to nearly
Publish At:2020-02-20 10:49 | Read:354 | Comments:0 | Tags:CISO Energy & Utility Security Services Brute-Force Attack C

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government in the U.S. have increased dramatically over the last several years. In 2019 alone, ransomware affected more than 100 state and local governments, according to Recorded Future — and that’s just one threat vector. Municipalities are also at risk from insider threats, coordinated attacks and other perils. What is it about
Publish At:2020-02-17 18:22 | Read:367 | Comments:0 | Tags:Government Credit Card Data Cyberattacks Data Breaches Data

What Is a DDoS Attack?

After 20 years of prominence, distributed denial-of-service (DDoS) attacks may be causing more devastating effects than ever. The first DDoS attack occurred way back on July 22, 1999 when a network of 114 computers infected with a malicious script called Trin00 attacked a computer at the University of Minnesota, according to MIT Technology Review. The infect
Publish At:2020-02-15 17:18 | Read:240 | Comments:0 | Tags:Network Security Intelligence & Analytics Application Securi

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence (AI) isn’t new. What is new is the growing ubiquity of AI in large organizations. In fact, by the end of this year, I believe nearly every type of large organization will find AI-based cybersecurity tools indispensable. Artificial intelligence is many things to many people. One fairly neutral definition is that it’s a bran
Publish At:2020-02-09 10:30 | Read:331 | Comments:0 | Tags:Artificial Intelligence Data Protection Identity & Access di

US-Iran conflict shifted to the Cyber World

Iranian Hackers Launched Thousands of Cyber Attacks against the USA The tension between the USA and Iran significantly increased after the USA’s drone strike that eliminated Iran’s Gen. Qassem Soleimani. Iran promised to retaliate and launched a dozen unsuccessful missiles aiming at Iraqi bases housing U.S. troops. Iran rockets even landed in the Green Zone
Publish At:2020-01-09 09:15 | Read:575 | Comments:0 | Tags:Mobile News News Security cyberattacks

WhatsApp spyware is being used to curtail the freedom of the press in India

In most cases malware is associated with theft. From keyloggers that collect passwords and credit card details to sophisticated tools for breaking into secure company networks, malware has many uses – mostly for committing crime. However, a new use has emerged in recent months – citizen surveillance. Political activists and journalists under investigation Me
Publish At:2019-11-15 09:15 | Read:632 | Comments:0 | Tags:Mobile News News Social Media cyberattacks Cybercrime WhatsA

SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath

Cyberattacks, many have noted, are the fastest growing economic crime not only in the United States, but also around the world. This upward trend has been observed since 2014, according to PricewaterhouseCoopers (PwC), and won’t likely be slowing down anytime soon. Cyberattacks—much like the advancement of technology, the interweaving of digital lives am
Publish At:2019-11-11 23:20 | Read:715 | Comments:0 | Tags:Business cyberattacks malware medium businesses Pricewaterho

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

The global average cost of a data breach is now $3.92 million — a 12 percent increase since 2014. Fortunately, the average cybersecurity budget is also increasing alongside breach cleanup costs. How to prioritize your budget is never a simple question. However, there’s a lot of insight to be gleaned from industry studies on how chief information secur
Publish At:2019-10-18 10:20 | Read:885 | Comments:0 | Tags:CISO Business Continuity Chief Executive Officer (CEO) Chief

How to Tell Safe Advertisements From Dangerous Malvertising

Advertising is the life blood of the internet. Some of the world’s biggest and most influential tech companies earn a large chunk of their revenue through harmless and safe advertisements, but some of the most successful cybercriminals also rely on advertising. When good ad networks are tricked into delivering malware, it’s known as malvertising.
Publish At:2019-10-18 10:20 | Read:671 | Comments:0 | Tags:Endpoint Fraud Protection Adware Artificial Intelligence (AI

Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise

Indicators of compromise (IoCs) are artifacts such as file hashes, domain names or IP addresses that indicate intrusion attempts or other malicious behavior. These indicators consist of: Observables — measurable events or stateful properties; and Indicators — observables with context, such as time range. IoCs are crucial for sharing threat information and
Publish At:2017-09-18 17:25 | Read:4102 | Comments:0 | Tags:Fraud Protection Incident Response Cyberattacks Incident Res

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:2839 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

Keyloggers: Be careful what you type

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking t
Publish At:2017-06-09 21:20 | Read:3788 | Comments:0 | Tags:Security companies cyberattacks keyloggers technology

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud