HackDig : Dig high-quality web security articles for hacker

Loco Motives? Hacker Attacks Could Derail Train Cybersecurity, Researchers Say

It’s hard to argue with efficiency in tech or transportation. Despite the availability of air freight and commercial trucking services, trains stand out as both efficient and cost-effective when it comes to moving large quantities of material goods. According to SecurityWeek, however, the supervisory control and data acquisition network (SCADA) systems
Publish At:2016-01-12 21:40 | Read:3430 | Comments:0 | Tags:Advanced Threats Industries Cyberattacks Cybercrime Energy a

Don’t Let the Fox Guard the Henhouse: Protect Your Sensitive Data From the Insider Threat

Ever hear the expression “don’t let the fox guard the henhouse”? The farmer knows his chickens are valuable and puts them in a safe coop with a lock and a roof, protecting them from external threats such as opossums, cats and hawks. But what is the farmer doing to protect from within the coop? There are measures the farmer has to take — sta
Publish At:2016-01-06 02:55 | Read:3618 | Comments:0 | Tags:Data Protection Cyberattacks Insider Threat

The InfoSecond, Aug. 24–28: Cyberattacks, Ashley Madison and More!

It’s a new week, which means we’ve got another edition of the InfoSecond to help keep you updated on the biggest stories in cybersecurity. This week’s entry highlights the most infamous cyberattacks of the 21st century, the era of cybercrime, hacker myths, blurred lines in security research, an automobile hack and the discovery of new vulne
Publish At:2015-09-02 22:35 | Read:2767 | Comments:0 | Tags:Data Protection Ashley Madison Cyberattacks Data Breach Info

64% of Organizations are Potential Targets for Nation-State Cyberattacks, says Survey

According to a recent survey conducted at this year’s Black Hat USA security conference, nearly two-thirds of organizations are potential targets for nation-state cyberattacks.The survey conducted by Tripwire, which includes responses from 215 conference attendees, also found that 86 percent of those questioned have seen an increase in these targeted attacks
Publish At:2015-08-17 18:45 | Read:3225 | Comments:0 | Tags:Latest Security News black hat Cyberattacks Survey

The 10 Most Common Application Attacks in Action

Nowadays, application development is moving more and more onto the Web. The Web hosts entire productivity suites such as Google Docs, calculators, email, storage, maps, weather and news — everything we need in our daily lives. Our mobile phones are useless without the Internet since nearly all mobile applications connect to the cloud, storing our pictures, u
Publish At:2015-04-09 01:25 | Read:4439 | Comments:0 | Tags:Application Security Software & App Vulnerabilities Cross-Si

Zimperium Raises $12M in Series B Funding Led by Telstra

We are excited to announce that Zimperium raised $12M in Series B Funding. This is a major milestone for Zimperium and is a testament to the quality of the Z-Team, the products we develop and the customers we have in place successfully using Zimperium’s Mobile Threat Defense. 2014 was a year of building for Zimperium. We launched the world’s fi
Publish At:2015-02-26 22:20 | Read:2501 | Comments:0 | Tags:Mobile security News Zimperium Mobile Security cyberattacks

Cutting Through the Weekly Mobile Security Noise: The Weakest Link

In the world of cyber security there is no denying that we are only as strong as our weakest link. The main issue however is trying to predict which link is most likely to make a mistake and leave an organization vulnerable to a potential security breach. This week we saw the conversation focused on identifying which links within the enterprise ar
Publish At:2015-02-04 01:00 | Read:3615 | Comments:0 | Tags:Mobile security News BYOD threat as an advantage cyber secur

Is the White House Coming Up Short on Cybersecurity…

As millions watched the State of the Union address on Tuesday night, I know many of us in the cyber industry were interested to see if, and how, cybersecurity would be addressed. The subject has finally hit the mainstream media, movies, magazines and now the national stage! This is a striking departure after long being relegated to server rooms an
Publish At:2015-01-26 15:40 | Read:2886 | Comments:0 | Tags:Mobile security News advanced mobile threat defense cyber se

Cutting through the Weekly Mobile Security Noise: The State Of Cyber Security

head> This week the nation watched as the president of the United States of America attempted to touch on the nation’s ever increasing cyber security threat. While it was encouraging to see an issue that has long been kept somewhat out of site from the American public finally hit the mainstream stage, most of us in the industry agree that it hardly
Publish At:2015-01-23 14:20 | Read:4704 | Comments:0 | Tags:Mobile security News cyber security cyberattacks Enterprise

Don’t take a knife to a gunfight – the mobile security dilemma

Zimperium is growing with more customers, partners and most recently, more talent! We’re pleased to announce the appointment of John Michelsen to the role of Chief Product Officer, CPO. John will be working closely to manage our development and product roadmap to continue our commitment to excellence for our enterprise mobile users around the wor
Publish At:2015-01-21 18:25 | Read:3684 | Comments:0 | Tags:Mobile security News Zimperium Mobile Security advanced mobi

Researchers find it’s terrifyingly easy to hack traffic lights

Taking over a city’s intersections and making all the lights green to cause chaos is a pretty bog-standard Evil Techno Bad Guy tactic on TV and in movies, but according to a research team at the University of Michigan, doing it in real life is within the realm of anyone with a laptop and the right kind of radio. In a paper published this month, the researc
Publish At:2014-08-21 06:00 | Read:3904 | Comments:0 | Tags:Ministry of Innovation Risk Assessment attacks compromise Cy


Share high-quality web security related articles with you:)


Tag Cloud