HackDig : Dig high-quality web security articles for hacker

Stalkerware developer dealt new blow by FTC

Last week, the US Federal Trade Commission (FTC) interpreted its broad consumer protection mandate to file a first-of-its-kind enforcement action against the developer of three mobile stalkerware applications. The developer was banned from further selling the apps unless significant changes were made in design and functionality. The FTC’s required change
Publish At:2019-11-11 23:20 | Read:68 | Comments:0 | Tags:Stalkerware Capital One consent agreement consent order data

A week in security (October 28 – November 3)

Last week on Malwarebytes Labs, we celebrated the birth of the Internet 50 years ago, highlighted reports about the US Federal Trade Commission (FTC) filing a case against stalkerware developer Retina-X, issued a PSI on disaster donation scams, looked at the top cybersecurity challenged SMBs face, and provided guidance to journalists on how they can defend t
Publish At:2019-11-11 23:20 | Read:78 | Comments:0 | Tags:A week in security Adobe Creative Cloud advanced persistent

The Evolution of Phishing: The Spear Is Aimed at You

You can’t go a week without seeing a story about a data breach or ransomware hitting organizations. These breaches can be very costly, but they still continue to show up. Are the good guys not winning the cybersecurity war? Organizations invest millions of dollars in security products and services, but they keep getting breached.We definitely have a skills g
Publish At:2019-10-18 10:10 | Read:239 | Comments:0 | Tags:Security Awareness data breach ransomware spear fishing

Cyber News Rundown: Data Dash

Reading Time: ~ 2 min. DoorDash Data Breach Nearly five months after a breach, DoorDash has just now discovered that unauthorized access to sensitive customer information has taken place. Among the stolen data were customer names, payment history, and contact info, as well as the last four digits of both customer payment cards and employee bank accounts.
Publish At:2019-10-04 16:10 | Read:425 | Comments:0 | Tags:Industry Intel data breach ransomware

5 Digitally-Rich Terms to Define, Discuss with Your Kids

Over the years, I’ve been the star of a number of sub-stellar parenting moments. More than once, I found myself reprimanding my kids for doing things that kids do — things I never stopped to teach them otherwise. Like the time I reprimanded my son for not thanking his friend’s mother properly before we left a birthday party. He was seven when his
Publish At:2019-09-28 23:20 | Read:586 | Comments:0 | Tags:Family Safety #BeCyberSmart #CyberAware Be Internet Awesome

What role does data destruction play in cybersecurity?

When organization leaders think about cybersecurity, it’s usually about which tools and practices they need to add to their stack—email protection, firewalls, network and endpoint security, employee awareness training, AI and machine-learning technology—you get the idea. What’s not often considered is which items should be taken away. Nearly
Publish At:2019-09-20 23:20 | Read:540 | Comments:0 | Tags:Business data data breach data destruction Data privacy dega

14 Million Customers Affected By Hostinger Breach: How to Secure Your Data

Whether you’re a small business owner or a blogger, having an accessible website is a must. That’s why many users look to web hosting companies so they can store the files necessary for their websites to function properly. One such company is Hostinger. This popular web, cloud, and virtual private server hosting provider and domain registrar boasts over 29 m
Publish At:2019-09-19 23:20 | Read:356 | Comments:0 | Tags:Consumer Threat Notices cybersecurity Data Breach data prote

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short answer to that question. The short answer is don’t
Publish At:2019-09-19 23:20 | Read:450 | Comments:0 | Tags:Family Safety BYOD cyberattack cybercrime cybersafety cybers

Attention Facebook Users: Here’s What You Need to Know About the Recent Breach

With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come tons of data, including some personal information that may now potentially be exposed. According to TechCrunch, a security researcher found an online database exposing 419 million user phone numbers linked to Facebook accounts. It appears
Publish At:2019-09-19 23:20 | Read:214 | Comments:0 | Tags:Consumer Threat Notices cybersecurity Data Breach data prote

3 Things You [Probably] Do Online Every Day that Jeopardize Your Family’s Privacy

Even though most of us are aware of the potential risks, we continue to journal and archive our daily lives online publically. It’s as if we just can’t help it. Our kids are just so darn cute, right? And, everyone else is doing it, so why not join the fun? One example of this has become the digital tradition of parents sharing first-day back-
Publish At:2019-09-19 23:20 | Read:344 | Comments:0 | Tags:Family Safety #CyberAware app safety computer security cyber

Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt

Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential car buyers don’t expect is to have their data exposed for all to see. But according to Threatpost, this story rings true for many prospective buyers. Over 198 million records containing personal, loan, and financial information on prospective car buyers
Publish At:2019-09-19 23:20 | Read:314 | Comments:0 | Tags:Consumer Threat Notices cybersecurity Data Breach data prote

Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know

I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas, I Venmo it. A Taco Bell study break with the roommates? No problem. With one click, I transfer money from my Venmo account to hers. She uses a Venmo credit card to make her purchase. To this mom, cash apps may be the best thing to happen to parenting
Publish At:2019-09-19 23:20 | Read:413 | Comments:0 | Tags:Family Safety app security Apple Pay Cash App cash apps cash

Is Your Medical Data Safe? 16 Million Medical Scans Left Out in the Open

Have you ever needed to get an X-ray or an MRI for an injury? It turns out that these images, as well as the health data of millions of Americans, have been sitting unprotected on the internet and available to anyone with basic computer expertise. According to ProPublica, these exposed records affect more than 5 million patients in the U.S. and millions more
Publish At:2019-09-19 23:20 | Read:297 | Comments:0 | Tags:Consumer Threat Notices cybersecurity Data Breach data prote

One third of Americans’ cell numbers available on password-free server

Cell Numbers of one-third of the US population found on a password-free server Approximately 133 million US-based cell numbers are part of the 419 million records found by cyber-security researches on a password-free server. The private data is originating from Facebook. Most of the entries stored on the easily accessible server contained not only cell numbe
Publish At:2019-09-19 17:05 | Read:415 | Comments:0 | Tags:Mobile News News cybersecurity data breach news

Paradise Papers were the result of the hack of external attackers

Most of the Paradise Papers came from offshore legal firm Appleby, which confirms the leak came from a hack on its network and no insiders were involved. The Paradise Papers is a collection of more than 13.4 million financial documents leaked online that has shed light on how major figures in the world of business, politics, entertainment, and sport move th
Publish At:2017-11-07 05:10 | Read:41935 | Comments:0 | Tags:Breaking News Data Breach Hacking Appleby data leak Panama P

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud