HackDig : Dig high-quality web security articles for hacker

Five Ways Enterprises Can Close the Cybersecurity Skills Gap

With global cybersecurity job openings and security threats at all-time highs, enterprises are struggling to fill positions with qualified staff. But while the problem threatens to plague the IT industry for years to come, security leaders and hiring managers can take proactive measures to attract and retain top talent for their organizations. Five Tips to C
Publish At:2017-06-24 00:25 | Read:69 | Comments:0 | Tags:CISO Academia Cybersecurity Cybersecurity Jobs Education Pro

Virgin Media customers asked to change passwords over hacking alert

800.000 Virgin Media customers advised to change their passwords over imminent hack risk Virgin Media, one of UK’s larger Internet providers, has advised more than their 800.000 customers using a specific router (Super Hub 2), to change their passwords immediately after an investigation revealed they are prone to hacking. The warning comes after ethical secu
Publish At:2017-06-23 16:50 | Read:108 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

Are you ready for the summer? List of security tips

After a relatively cold winter and a fantastic spring we all turn our heads towards the fast approaching summer. In a blink of an eye, we will start enjoying the longer days filled with sunshine, shorter working hours, quality time on the beach or by the pool, and a whole lot of trips and fun outdoor activities. Researchers claim that about 50% of the people
Publish At:2017-06-22 04:00 | Read:158 | Comments:0 | Tags:Mobile News Tips cybersecurity tips

Skype down due to a DDoS cyberattack

Cyber-crime gang boasts of bringing down Skype on Twitter If you’ve had problems connecting to Skype recently it could well be the result of the latest attack launched by the ‘CyberTeam’ gang. This group of cyber-criminals have been boasting on Twitter, under the hashtag #SkypeDown, of crashing the Microsoft video chat platform. Skype down by CyberTeam Hell
Publish At:2017-06-20 15:10 | Read:220 | Comments:0 | Tags:Mobile News News cybersecurity DDoS DDOS

A Brief History of Computing: As Technology Evolves, Cybersecurity Lags Behind

Security isn’t what it used to be, especially in the area of computing. It has become far more ephemeral, less obvious and much more important. To keep pace with the evolving threat landscape, we all need to reset our expectations about what cybersecurity actually is in today’s world and look carefully at what it might become. Early Computing In
Publish At:2017-06-19 09:55 | Read:108 | Comments:0 | Tags:Data Protection Network Security Intelligence & Analytics Co

Are you the dream victim of a ransomware cybercriminal?

Ransomware attacks continue to be popular The recent ransomware attack against the NHS caused millions of pounds worth of damage – and put countless lives at risks when operations and general treatment had to be delayed. Despite the chaos, security experts believe that the criminals behind the attack made just $100,000 in the week after infection. Ransomware
Publish At:2017-06-16 19:05 | Read:187 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers

Bringing Systems Integration Skills to Cybersecurity Degree Students

For the third year, the Warwick Manufacturing Group (WMG) at the University of Warwick will run the Enterprise Cyber Security (ECS) module, which is part of the institution’s Master of Science in Cyber Security and Management program. The individual degree modules offer students a solid set of security skills, culminating with the ECS module, which is
Publish At:2017-06-14 19:25 | Read:265 | Comments:0 | Tags:Data Protection Academia Cybersecurity Cybersecurity Trainin

How to build a safe smart home?

Building a smart home is not hard at all… Coming home to a pre-heated house, being able always to monitor what is going on at home, knowing that if the emergency alarm sets you will not only get a notification on your cell so you can inform the authorities, but you will have a device that will start recording everything that is going on. It all sounds
Publish At:2017-06-13 17:25 | Read:163 | Comments:0 | Tags:Mobile News Technology cybersecurity IoT

Building Upon Trump’s Executive Order on Cybersecurity

Just days after President Trump signed his executive order on cybersecurity, the massive WannaCry attack dominated the news cycle. The assault infiltrated 150 countries, penetrating national networks and infrastructure. A breach of such international scale has rightly raised questions about government preparedness for digital warfare. In answering these co
Publish At:2017-06-09 10:30 | Read:203 | Comments:0 | Tags:Government Cybersecurity Cybersecurity Framework Federal Gov

Drilling for Answers: Cyberattacks on the Rise in the Oil and Gas Industry

Often when we hear buzzwords like botnet, malware and spear phishing (among many, many others), we tend to associate them with certain industries — retail, health care, banking. However, in a world driven by the constant effects of newer and better technology, all industries are being affected. Specifically, the oil and gas industry has seen an increase in c
Publish At:2017-06-08 16:05 | Read:300 | Comments:0 | Tags:Cognitive Energy & Utility Cognitive Security Cybersecurity

Should we worry that the UK General Election is hacked?

Should we worry about UK election tampering? When Donald Trump won the 2016 US Election, political experts were shocked – most had failed to predict that he would go on to become the President. The UK’s decision to leave the European Union earlier in the year had been similarly surprising – again, most had expected a narrow win for the “Remain” campaign. Sin
Publish At:2017-06-08 08:30 | Read:246 | Comments:838 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Avoiding Security Hype, the Hazard From Hollywood

If it’s summer, it must be Hollywood blockbuster season. Disaster! Horror! Explosions! Supervillains! But in the corporate world, it’s summer blockbuster season year-round. Networks of zombie bots! Twisted teenage genius hackers! The chills and thrills are dramatic, and they make for easy presentations. Give the audience enough explosions, and
Publish At:2017-06-06 08:50 | Read:235 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Cybersecurity

How do you know if the leaks are real?

Is the Media Able to See the Difference Between Fake, Real and Tampered Leaks? Since President Donald Trump became POTUS, he has been accusing reputable sources of information such as BBC, NY Times, NBC News and CNN for being ‘fake news’. However, every single person, who has ever had to deal with these outlets, especially with publications such as BBC
Publish At:2017-06-06 01:15 | Read:208 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers Phishing

Is it dangerous to share your location on the internet?

Look at the apps installed on your smartphone and you’ll see that many of them offer location sharing functions. Location sharing is incredibly useful – when used correctly. Here are a few things you should be aware of “Check-ins” and strangers Apps like Foursquare and Swarm encourage users to “check-in” when visiting restaurants, bars and other places of in
Publish At:2017-06-02 16:40 | Read:332 | Comments:0 | Tags:Mobile Security Social Media cybersecurity social media tips

More Than Half a Billion Passwords Compromised

A security research firm discovered that there’s an anonymous database containing more than 560 million passwords. The database is accessible on the Dark Web, and it is a compilation of information exposed by all major leaks over the last five years. It includes stolen account information from security breaches of LinkedIn, DropBox, LastFM, MySpace, Adobe, N
Publish At:2017-06-01 22:05 | Read:296 | Comments:0 | Tags:Mobile News Security cybersecurity Hackers passwords


Share high-quality web security related articles with you:)


Tag Cloud