HackDig : Dig high-quality web security articles for hackers

How Small Businesses Can Avoid Cyberattacks in 2021

How Small Businesses Can Avoid Cyberattacks in 2021 January 19th, 2021 No Comments antivirus, Data Privacy, Data Protection, Mobile Security, PC security Across 2020 – and, most likely, throughout 2021 – the priority of small business owners has bee
Publish At:2021-01-19 08:00 | Read:219 | Comments:0 | Tags:antivirus Data Privacy Data Protection Mobile Security PC se

What is STRIDE and How Does It Anticipate Cyberattacks?

STRIDE threat modeling is an important tool in a security expert’s arsenal. Threat modeling provides security teams with a practical framework for dealing with a threat. For example, the STRIDE model offers a proven methodology of next steps. It can suggest what defenses to include, the likely attacker’s profile, likely attack vectors and the as
Publish At:2021-01-11 21:47 | Read:200 | Comments:0 | Tags:Cloud Security Threat Hunting Threat Intelligence threat mod

Privacy in 2020 and What to Expect for the Year Ahead

2020 was dominated by news of the pandemic and anchored by reality that we all found ourselves in – entire families logging in remotely, trying to keep school and work feeling “normal.” While we tested the limits of what a home office could sustain, the privacy and security of a fully remote world was put front and center. In this piece, we take a look
Publish At:2020-12-28 06:38 | Read:390 | Comments:0 | Tags:IT Security and Data Protection data privacy data protection

Could Universities’ Use of Surveillance Software Be Putting Students at Risk?

Life for university students has changed massively during the coronavirus pandemic, as it has for all of us. While some in-person lectures and seminars are still taking place, there has been a big shift to remote learning. This has, perhaps understandably, led to concerns about how well students are engaging with this way of studying.Many universities have s
Publish At:2020-12-18 00:56 | Read:272 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data priva

Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy

They come in the mail — ominous-looking envelopes that are devoid of branding and obvious marketing embellishments. Plain white, marked with often-unrecognizable return addresses, and relatively thin — the contents of which will spoil your day and cause you to lose yet a bit more faith in humanity. No, it’s not a tax bill; rather, it&rsquo
Publish At:2020-12-17 09:29 | Read:183 | Comments:0 | Tags:Data Protection Security Services data encryption Data Priva

Netflix’s ‘The Social Dilemma’: An Eye-Opener to a Silent Existential Crisis, or an Overblown Scare Tactic?

Netflix’s ‘The Social Dilemma’: An Eye-Opener to a Silent Existential Crisis, or an Overblown Scare Tactic? November 11th, 2020 No Comments Data Privacy, Data Protection, Mobile Security, Online Privacy, Uncategorized “What I want people to know is
Publish At:2020-11-11 10:23 | Read:458 | Comments:0 | Tags:Data Privacy Data Protection Mobile Security Online Privacy

How to Spot and Stop Popular Online Shopping Scams this Shopping Season

How to Spot and Stop Popular Online Shopping Scams this Shopping Season November 1st, 2020 No Comments anti-phishing, Data Privacy, Data Protection, Holidays, Online Privacy, PC security With COVID-19 keeping stores closed and people at home all aro
Publish At:2020-11-01 12:29 | Read:848 | Comments:0 | Tags:anti-phishing Data Privacy Data Protection Holidays Online P

Don’t Torpedo Your Data Security Program: 5 Best Practices to Consider

If you are like most security leaders responsible for protecting your company’s crown jewels, you’ve certainly asked: Can malicious insiders access my organization’s sensitive and mission-critical data? Indeed, it’s a good question to ask, because there may be unseen torpedoes in motion that can sink your efforts to curtail this vola
Publish At:2020-10-29 11:34 | Read:480 | Comments:0 | Tags:Data Protection Data Privacy Data Security security

13 Spooky Cybersecurity Facts for Halloween and Cyber Security Awareness Month

13 Spooky Cybersecurity Facts for Halloween and Cyber Security Awareness Month October 28th, 2020 No Comments antivirus, Data Privacy, Data Protection, Holidays We celebrate Halloween this year quite differently than ever before. Due to the COVID pa
Publish At:2020-10-28 14:53 | Read:471 | Comments:0 | Tags:antivirus Data Privacy Data Protection Holidays cybersecurit

Is Video Conferencing Still A Security Risk to Your Business?

Is Video Conferencing Still A Security Risk to Your Business? October 22nd, 2020 No Comments antivirus, Data Privacy, Data Protection, Uncategorized This year with COVID, the American worker is working differently –as well as shopping, being enterta
Publish At:2020-10-22 10:41 | Read:465 | Comments:0 | Tags:antivirus Data Privacy Data Protection Uncategorized securit

How to Choose a Good Password

How to Choose a Good Password October 15th, 2020 No Comments Data Privacy, Data Protection, Mobile Security, Online Privacy, Online Safety, Passwords Passwords. We need them for almost everything nowadays. Entering our phones, our computers, social
Publish At:2020-10-14 23:17 | Read:936 | Comments:0 | Tags:Data Privacy Data Protection Mobile Security Online Privacy

Back to School – Remote Learning Security Amid Covid-19 Pandemic

Back to School – Remote Learning Security Amid Covid-19 Pandemic August 23rd, 2020 No Comments antivirus, Data Privacy, Data Protection, remote learning, remote work Just as in every year, September marks the end of summer and the beginning of
Publish At:2020-08-23 09:46 | Read:1100 | Comments:0 | Tags:antivirus Data Privacy Data Protection remote learning remot

Snail Mail With a Privacy Twist

A friend of mine received an interesting piece of snail mail the other day. It was one of those inheritance scam letters that usually arrive in E-Mail.An image of the letter is shown below:In summary, the author, a high-ranking bank official, has an unclaimed inheritance that he is willing to split with the letter’s recipient if the recipient will accept the
Publish At:2020-08-20 00:30 | Read:779 | Comments:0 | Tags:IT Security and Data Protection cybercrime data privacy Phis

Protecting your Devices’ Mic from Hackers

Protecting your Devices’ Mic from Hackers August 10th, 2020 No Comments antivirus, Data Privacy, Mobile Security, Online Privacy Eavesdropping. It used to be something we did to people who shared the same space with us before text messages was a thi
Publish At:2020-08-10 15:12 | Read:889 | Comments:0 | Tags:antivirus Data Privacy Mobile Security Online Privacy

Data Accountability and Transparency Act of 2020 looks beyond consent

In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t have to be. In June, Democratic Senator Sherrod Brown of Ohio released a discussion draft of a new data privacy bill to improve Americans’ data privacy rights and their relationship with the countless companies that collect, store
Publish At:2020-08-06 04:45 | Read:927 | Comments:0 | Tags:Privacy consent Data Accountability and Transparency Act Dat

Tools

Tag Cloud