HackDig : Dig high-quality web security articles for hackers

The Digital Ship is Full of Leaks. But There Are Ways to Keep it Afloat.

Years ago, while anchoring the CBS Evening News during an on-air mishap, Dan Rather made an offhand remark, observing that “To err is human.  But to really screw up, you need a computer.” His observation was, to be sure, somewhat facetious, although the power of digital technology to amplify small mistakes and oversights into massive ones is real.
Publish At:2020-08-03 15:10 | Read:126 | Comments:0 | Tags:INDUSTRY INSIGHTS Risk Management Data Protection

How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That data could involve military campaigns, plots to overthrow political leaders or political dealings. In some cases, the use of en
Publish At:2020-08-03 12:25 | Read:68 | Comments:0 | Tags:Data Protection Cybersecurity data encryption Data Security

Build a Roadmap for Cyber Resilience

The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. It’s not just the amount of attacks that grew; 64% o
Publish At:2020-08-03 08:33 | Read:109 | Comments:0 | Tags:CISO Data Protection Endpoint Advanced Attacks Advanced Thre

Microsoft to Keep Exploring TikTok Deal After Talks With Trump

Microsoft announced Sunday it would continue talks to acquire the US operations of popular video-sharing app TikTok, after meeting with President Donald Trump who seemingly backed off his earlier threats to ban the Chinese-owned platform."Following a conversation between Microsoft CEO Satya Nadella and President Donald J Trump, Microsoft is prepared to conti
Publish At:2020-08-03 07:27 | Read:58 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Compliance Risk

Autofill Through Biometric Authentication Coming to Chrome

Google this week announced a series of security and ease-of-use improvements for the Autofill feature in Chrome.Designed to help users fill in forms in a secure manner, everywhere on the web, Autofill is about to become more secure when it comes to credit card numbers, Google says.For those users who save credit cards in their Google Accounts, Chrome typical
Publish At:2020-07-31 12:20 | Read:160 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Data Protection

Bill Aimed at Ending 'Warrant-Proof' Encryption Introduced in House

Roughly one month after United States senators introduced a “balanced” bill that would require tech companies to provide law enforcement with access to encrypted user data, a companion bill was introduced in the House of Representatives this week.Referred to as the Lawful Access to Encrypted Data Act, the bill aims to put a stop to criminals using “warrant-p
Publish At:2020-07-31 09:57 | Read:75 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Compliance Data Protection Track

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. Average attack
Publish At:2020-07-30 19:37 | Read:76 | Comments:0 | Tags:Advanced Threats Application Security Cloud Security Data Pr

What’s New in the 2020 Cost of a Data Breach Report

In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual Cost of a Data Breach Report, with research by the Ponemon Institute and published by IBM Security, continues to provide a detailed view of the financial impacts security incidents can have on organizations, with histo
Publish At:2020-07-29 08:52 | Read:101 | Comments:0 | Tags:Data Protection Threat Intelligence Threat Research Cost of

Darknet Cybersecurity: How Finance Institutions Can Defend Themselves

Financial firms continue to move to digital-first deployments, as retail branches close, and people shift to remote work. This shift makes understanding and preventing even common darknet, or dark web, threats a priority. Financial cybersecurity investment institutions need to understand what the dark web is, provide their security teams with the tools to ex
Publish At:2020-07-28 17:26 | Read:121 | Comments:0 | Tags:Advanced Threats Data Protection Identity & Access Threat In

Facebook Says EU Antitrust Probe Invades Employee Privacy

Facebook on Monday said it is asking EU courts to review "exceptionally broad" requests by antitrust regulators there that would scoop up employees' personal information.The US-based internet colossus maintained it has been cooperating with a European Commission antitrust investigation and will continue to do so, but that the wording of commission requests c
Publish At:2020-07-28 16:19 | Read:66 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Compliance Data Protection Priva

Source Code From Major Firms Leaked via Unprotected DevOps Infrastructure

Source code belonging to tens of companies, including several major organizations, has been leaked online after it was found on unprotected DevOps infrastructure.Swiss-based IT consultant Till Kottmann has posted a list of roughly 50 companies that at some point exposed source code. For some of the impacted organizations the code has been removed from the re
Publish At:2020-07-28 16:19 | Read:52 | Comments:0 | Tags:NEWS & INDUSTRY Risk Management Data Protection Manageme

Can My Webcam Be Accessed Remotely?

Can My Webcam Be Accessed Remotely? July 28th, 2020 No Comments antivirus, Data Privacy, Data Protection, Online Privacy, Uncategorized With the huge increase of people working from home due to Covid-19, millions of home laptops and desktops are lay
Publish At:2020-07-28 16:14 | Read:69 | Comments:0 | Tags:antivirus Data Privacy Data Protection Online Privacy Uncate

Australian Watchdog Accuses Google of Privacy Breaches

Australia’s consumer watchdog launched court action against Google on Monday alleging the technology giant misled account holders about its use of their personal data.The Australian Competition and Consumer Commission’s action in the Federal Court is the latest litigation Google has faced around the world over allegations of privacy breaches.The commission a
Publish At:2020-07-27 17:10 | Read:91 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Compliance Data Protection Priva

Bluetooth-Enabled 'Mooltipass' Hardware Password Manager Unveiled

The creators of the Mooltipass hardware password manager have unveiled the Mooltipass Mini BLE, a Bluetooth-enabled version of the device that includes many new and useful features.Back in 2016, SecurityWeek reviewed the second generation of the Mooltipass open source hardware password manager, the Mooltipass Mini. That version of the product can be connecte
Publish At:2020-07-27 17:10 | Read:103 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Data Protection

Chinese Drone Giant DJI Responds to Disclosure of Android App Security Issues

Chinese drone giant Da Jiang Innovations (DJI) on Thursday responded to the disclosure of security issues discovered by researchers in one of its Android applications.France-based cybersecurity company Synacktiv recently conducted an analysis of the DJI GO 4 application for Android. The app allows users to control and manage their DJI drones, and it’s mainly
Publish At:2020-07-24 08:05 | Read:162 | Comments:0 | Tags:Cyberwarfare Mobile Security NEWS & INDUSTRY Privacy Ris


Share high-quality web security related articles with you:)