HackDig : Dig high-quality web security articles for hacker

PlayStation Network Hacked. Again.

When mysterious tweets appeared on the official Sony PlayStation Twitter feed on Monday morning, it quickly became clear that the account had been hacked. Indeed, the hackers made little effort to hide their activities, proudly announcing that the breach had been carried out by the OurMine Security Group. Photo credit: Twitter Initially there were a few twee
Publish At:2017-08-23 14:50 | Read:94 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats

Even with security technology in place, companies know that it is not possible to prevent all cyberattacks. At any rate, however, the damages caused by attacks can be greatly mitigated with quick and decisive action in response to threats. The answer is to use a cybersecurity solution capable of monitoring, uninterruptedly, all applications in order to block
Publish At:2017-08-22 04:50 | Read:155 | Comments:0 | Tags:News Panda Security alliance cybersecurity deloitte

Boarding Passes May Soon Be Part of the Past with Biometric

Are the Biometric security sistem safe? Back in June, the Department of Homeland Security (DHS) released a privacy impact assessment update for the Traveler Verification Service (TVS). The update is aimed at international travelers and reveals further developments and expanding on the biometric entry-exit airport system throughout the US. Intended to improve
Publish At:2017-08-22 01:55 | Read:85 | Comments:0 | Tags:Mobile News Technology cybersecurity

Across the Great Divide: Measuring Security Awareness Among US and UK Users

End users in the U.S. and U.K. have very different attitudes toward security. Earlier this summer, Wombat Security surveyed more than 2,000 working adults — half in the U.S. and half in the U.K. — about various cybersecurity topics and perceptions of best practices. The researchers found some interesting surprises and noted a series of different attitudes a
Publish At:2017-08-18 13:25 | Read:127 | Comments:0 | Tags:Risk Management Cybersecurity Mobile Security Password Manag

Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

Securing data is never easy. It often requires the infusion of outside expertise to put together an effective information security strategy. Data stored on government servers is especially valuable to both individual fraudsters and nation-state actors, and government agencies have been under pressure to enhance their infrastructure security capabilities and
Publish At:2017-08-18 13:25 | Read:71 | Comments:0 | Tags:Data Protection Government Cybersecurity Cybersecurity Frame

Hackers target energy and utility firms

Why cyber warfare is becoming so important In the early stages of any war, the first action is to try and disrupt the infrastructure of an enemy. In recent years, this means risking people’s lives to bomb key infrastructure, like power plants, bridges and fuel depots. With key utilities crippled, society quickly breaks down, making it very hard for the count
Publish At:2017-08-18 05:50 | Read:109 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Artificial Intelligence (AI) – Pros and Cons

What are the pros and cons of AI? Mark Zuckerberg and Elon Musk have been debating about the future of artificial intelligence (AI) for quite some time. Last month they continued the conversation by making their debate public. During a Q&A session with Nevada’s governor Brian Sandoval, Elon made a few statements about the dangers of AI. Tesla’s CEO said
Publish At:2017-08-17 11:25 | Read:88 | Comments:0 | Tags:Mobile News Technology AI artificial intelligence cybersecur

The Godfathers of Virtualization Returning to VMWorld

Ian Pratt and Simon Crosby sold XenSource to Citrix in 2007. After working at Citrix, they decided to once again spin off and focus on cybersecurity. They are available to meet during VMWorld if you’d like to talk virtualization and security. We think of them as The Godfathers of Virtualization. They work they did with XenSource lead to what is today’s clo
Publish At:2017-08-15 17:35 | Read:174 | Comments:0 | Tags:Company News application isolation browsing click cybersecur

Viewing Cybersecurity From the Consumer’s Perspective

In recent years, cybersecurity has become a major disrupter across the globe. In a business landscape that depends on digitization and accelerated transactions, cybersecurity is crucial to both providers and consumers. Those consumers must consider cyber resilience when shopping for services or products, even if a vulnerability doesn’t directly affect
Publish At:2017-08-09 07:50 | Read:137 | Comments:0 | Tags:CISO Connected Devices consumers Cyber Resiliency Cybersecur

Are we “cyber safer” than ever?

After all recent attacks, what is the current cybersecurity status? 2017 has already seen a number of high profile cybersecurity events, and we expect many more before the year is out. As an evidence of this, PandaLabs records a 40% increase in attacked devices this quarter. Cybercriminals have been carrying out attacks on an unprecedented scale, even bringi
Publish At:2017-08-04 12:35 | Read:299 | Comments:0 | Tags:Mobile News Security cybersecurity security tips

Hotel hijacking: Are your bookings at risk?

What to keep in mind when booking your next trip? Planning your next trip has never been easier. You just go online, browse around until you find a price that works for you, and book your flights, room, and rent-a-car. Once it is all done, you save all your reservations, and you truly believe you are all set for the next big adventure in your life! You see t
Publish At:2017-08-03 17:45 | Read:303 | Comments:0 | Tags:Mobile News Security cybersecurity hotels tips

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the c
Publish At:2017-08-03 12:45 | Read:283 | Comments:0 | Tags:Innovation cybersecurity detection intelligence management p

PandaLabs Records a 40% Increase in Attacked Devices this Quarter

Traditional security solutions, although efficient in protecting against known malware, are incapable of protecting against attacks that use non-malicious tools and other advanced techniques. This argument has gained traction in recent investigations carried out by PandaLabs, the anti-malware laboratory at Panda Security. The laboratory presents its second q
Publish At:2017-08-01 10:30 | Read:271 | Comments:0 | Tags:News PandaLabs cybersecurity Malware quarterly report

DNS Attacks Could Cost Your Company $2 Million a Year

The DNS (Domain Name System) is the keystone of the proper functioning of the internet. Each time you access your email or your Facebook, you’re using it. So when a DNS server is under attack and inaccessible, every website that it supports also becomes unavailable. DNS attacks have already had a major impact in the functioning of companies, and it turns out
Publish At:2017-07-27 11:30 | Read:326 | Comments:0 | Tags:Security b2b cybersecurity dns

Turning Off Cybersecurity to Increase Productivity Shouldn’t Be How the Problem Gets Solved

It seems security teams are under a lot of pressure from the organization when it comes to the balance between productivity and staying secure. Our infographic below explains how this plays out: with some saying they turn off security and others modifying it. Cybersecurity shouldn’t be this hard and it shouldn’t impact end user behavior. Users s
Publish At:2017-07-24 23:15 | Read:203 | Comments:0 | Tags:Company News 2017 click cybersecurity infographic Infosecuri


Share high-quality web security related articles with you:)


Tag Cloud