HackDig : Dig high-quality web security articles for hacker

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more so than your Average Joe. Whether a reporter is trying to crowd-source information without revealing their story or operating in a country where freedom of the press is a pipe dream, cybersecurity plays an important role for any journ
Publish At:2019-11-11 23:20 | Read:471 | Comments:0 | Tags:How-tos communication data eavesdropping encrypted journalis

What role does data destruction play in cybersecurity?

When organization leaders think about cybersecurity, it’s usually about which tools and practices they need to add to their stack—email protection, firewalls, network and endpoint security, employee awareness training, AI and machine-learning technology—you get the idea. What’s not often considered is which items should be taken away. Nearly
Publish At:2019-09-20 23:20 | Read:2318 | Comments:0 | Tags:Business data data breach data destruction Data privacy dega

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Penetration testing is often conducted by security researchers to help organizations identify holes in their security and fix them, before cybercriminals have the chance. While there’s no malicious intent for the researcher, part of his job is to think and act like a cybercriminal would when hacking, or attempting to breach, an enterprise network. T
Publish At:2019-09-20 11:20 | Read:840 | Comments:0 | Tags:Researcher's corner amazon aws AWS buckets data hacking Inte

Cybersecurity Doesn’t Just Happen, You Have to Get a Round Tuit (We Have One For You)

It’s Monday. On the West Coast, Black Hat is over and if you traveled, you should be home. If you didn’t travel, it’s still Monday and there are things to be done. And August starts tomorrow – so you might be thinking, “Bah, let’s get through August and then I’ll refocus.” Not so fast. This is a round tuit. Y
Publish At:2017-07-31 14:15 | Read:5216 | Comments:0 | Tags:Threats bbc breaches data priorities research round tuit Sec

Goodbye Privacy? The US Has Recently Passed a Bill That Has Everyone Worried

 The US Congress  decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news. Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, however, required these companies to obtain permission fr
Publish At:2017-05-26 18:50 | Read:4186 | Comments:0 | Tags:Security companies data Internet Privacy

Immutable Integrity? – Blockchain Beyond the Bluster

Sometimes you could be forgiven for thinking that the incessant overuse of the word ‘disruptive’ these days could do with some, well, disrupting of its own. So much is written, presented and marketed around apparently ‘disruptive’ use of technologies like AI, IoT and of course blockchain, when much of it could perhaps be better described as foundation innova
Publish At:2017-04-03 10:15 | Read:6506 | Comments:0 | Tags:Off Topic blockchain data security

U.S. Senate Votes Could Put Your Data Privacy at Risk

Data privacy is a concern for many Americans, but the U.S. Senate is on its way to putting your data at even higher risk of privacy issues. Current laws have broadband privacy rules in place that require Internet Service Providers to receive explicit consent from consumers before they can share or sell private information, such as web browsing data, to adver
Publish At:2017-04-01 21:25 | Read:9869 | Comments:1 | Tags:Featured Articles IT Security and Data Protection data Priva

Texas Specialty Practice Warns 200K Patients of Ransomware Attack

A specialty practice in Texas has notified more than 200,000 patients of a ransomware attack that might have exposed their personal information.On 24 March, Urology Austin sent out notification letters to 279,663 patients informing them of an incident that occurred back in January. As quoted by DataBreaches.net:“On January 22, 2017, Urology Austin was
Publish At:2017-03-29 01:06 | Read:3323 | Comments:0 | Tags:Latest Security News data malware ransomware

Yahoo! Bleeds for the Protection of Customer Data

On March 1, Marissa Mayer, Yahoo!’s Chief Executive Office, gave up millions of dollars. As she noted in a blog post on Tumblr, “I am the CEO of the company [Yahoo!] and since this incident happened during my tenure, I have agreed to forgo my annual bonus and my annual equity grant.” All in, Mayer gave up upwards of 2 million in cash bonuses and millions mor
Publish At:2017-03-17 12:35 | Read:3364 | Comments:0 | Tags:Cyber Security Featured Articles breach data Yahoo

Do You Know Where Your Data Is? Prove It…

Many IT decision makers look at assets as hardware, but really they should consider why they have the hardware in the first place.These decision makers remember the very significant investments they made in servers, PCs, firewalls, and so on in order to deploy that new CRM or Electronic Medical Records System. They think of the tens of thousands of dollars t
Publish At:2017-03-08 04:10 | Read:8300 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data risk

Ransomware Attack Strikes Pennsylvania Senate Democratic Caucus

The Pennsylvania State Democratic Caucus has taken its computer systems temporarily offline following a ransomware attack.According to PennLive, the caucus discovered the attack early in the morning on 3 March. Offices remained open throughout the day. Even so, members and employees alike couldn’t access systems or data because the ransomware had sprea
Publish At:2017-03-08 04:10 | Read:3173 | Comments:0 | Tags:Latest Security News data malware ransomware

GDPR and the DPO: Five Things to Know About Your Next Job Vacancy

If the GDPR (General Data Protection Regulation), the EU’s data protection harmonisation project, was to become Hollywood movie, its genre would most likely be horror.Focus on the regulation over the past twelve months has been mostly aimed toward its penalties, with scare stories in no short supply. The GDPR has been called many things; visionary, giv
Publish At:2017-02-23 14:05 | Read:3893 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data GDPR

InterContinental Hotels Group Confirms Payment Card Breach at 12 Locations

InterContinental Hotels Group (IHG) has confirmed a data breach affected customers’ payment cards at 12 of its locations.On 3 February, IHG announced that it launched an investigation back on 28 December 2016 after receiving a report of unauthorized charges placed on customers’ credit cards. The Denham-based company, which owns 5,000 hotels that
Publish At:2017-02-07 10:45 | Read:3654 | Comments:0 | Tags:Latest Security News breach data malware

Police Charge Ohio Homeowner with Arson Using Pacemaker Data

Law enforcement used an Ohio homeowner’s pacemaker data to arrest and charge him with insurance fraud and arson.On 19 September 2016, residents of the area around Court Donegal in Middletown, Ohio woke up to the sound of a “loud explosion.” One of the residents, Mike Huff, said his dogs began barking at 6:30 a.m. When he looked outside, he
Publish At:2017-02-02 20:10 | Read:3653 | Comments:0 | Tags:Latest Security News arrest data pacemaker

Consumer Carelessness Leaves Sensitive Data in Returned Devices

My boyfriend works a demanding day job at a major Canadian big box furniture and appliance retailing chain. Knowing that I write about information security for a living, he had an interesting story to tell me:“An LG Smart TV was returned to us by the customer, and it had their credit card credentials in it! Why didn’t they do a factory reset firs
Publish At:2017-01-23 02:15 | Read:3543 | Comments:0 | Tags:Off Topic consumer data factory reset


Share high-quality web security related articles with you:)


Tag Cloud