HackDig : Dig high-quality web security articles for hackers

Creating Brand Trust: A Key Currency for Business

This is the first in a blog series about building and maintaining brand trust.  Brand trust has always been valuable for business, but the ways to develop it have changed a lot in the digital age. I’ve seen a dramatic shift in the last twenty years while I’ve worked in technology and development. In terms of both my personal and professiona
Publish At:2020-09-17 12:45 | Read:130 | Comments:0 | Tags:Data Protection Identity & Access Zero Trust digital trust C

Box Showcases New Offerings for Remote Working Environment

The primary problem caused by the growth in remote working is a new degree of complexity. The threats remain the same, but the solutions must be new. Box on Wednesday announced additions and enhancements to its range of products designed for the growing remote working environment.Box is expanding its capabilities by improving both the operation and security
Publish At:2020-09-16 12:22 | Read:95 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Data Protection

Back to Basics: Creating a Culture of Cybersecurity at Work

The importance of security culture can be seen now more than ever. Many of us work remotely; there are app concerns; and the lines between personal and business use of devices and networks are blurred, challenging our cyber resilience. Therefore, despite all the great tools, frameworks and protective measures in place, we need to ensure people are doin
Publish At:2020-09-16 09:33 | Read:181 | Comments:0 | Tags:CISO Data Protection Security Services cybersecurity educati

Europe Tests Gateway for Tracing Apps to Work Across Borders

Six European Union countries and the bloc’s executive Commission have begun testing a virtual “gateway” to ensure national coronavirus tracing apps can work across borders.The trial starting Monday will allow national computer systems that run tracing apps in the Czech Republic, Denmark, Germany, Ireland, Italy and Latvia to communicate with each other via a
Publish At:2020-09-15 08:59 | Read:139 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Data Protection

Razer Customer Data Exposed by Server Misconfiguration

A server misconfiguration has resulted in data pertaining to thousands of Razer customers being exposed to the Internet.A Singaporean-American manufacturer of gaming hardware, software, and systems, Razer also provides e-sports and financial services to its customers.The recently discovered misconfigured server, security researcher Bob Diachenko explains, co
Publish At:2020-09-14 09:31 | Read:127 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Data Protection Privacy & Co

TikTok Rejects Microsoft Offer, Oracle Sole Remaining Bidder

American tech giant Microsoft said Sunday its offer to buy TikTok was rejected, leaving Oracle as the sole remaining bidder ahead of the imminent deadline for the Chinese-owned video app to sell or shut down its US operations.TikTok is at the center of a diplomatic storm between Washington and Beijing, and President Donald Trump has set Americans a mid-Septe
Publish At:2020-09-14 05:37 | Read:151 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Compliance Risk

New Raccoon Attack Can Allow Decryption of TLS Connections

Researchers from universities in Germany and Israel have disclosed the details of a new timing attack that could allow malicious actors to decrypt TLS-protected communications.Named “Raccoon,” the attack has been described as complex and the vulnerability is “very hard to exploit.” While most users should probably not be concerned about Raccoon, several majo
Publish At:2020-09-10 07:45 | Read:136 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities Data Protection

Creating a Cybersecurity Culture Starts With Your Team

As cyberattacks become more prevalent and sophisticated, companies must put more faith in their employees to make sure they don’t put data at risk or fall victim to ransomware. But, employees are busier than ever. And, creating a cybersecurity culture at work becomes both more important and more challenging when employees work at home. Creating a stro
Publish At:2020-09-09 13:18 | Read:184 | Comments:0 | Tags:CISO Data Protection Security Services Cybersecurity Trainin

Data Residency Company InCountry Raises $18 Million

Data residency-as-a-service platform provider InCountry last week announced it raised $18 million in new funding, which brings the total capital secured by the company to $39 million.Founded in 2019, the San Francisco-based InCountry helps organizations run software-as-a-service (SaaS) applications in any country and ensure compliance with both internal and
Publish At:2020-09-07 13:17 | Read:128 | Comments:0 | Tags:NEWS & INDUSTRY Data Protection Management & Strateg

Ransomware Attacks: How to Protect your Data With Encryption

Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. Recently, the University of California San Francisco fell victim to a ransomware attack on key academic and research data (the institution is known to be working on a cure for COVID-19) and ended up paying over $1.14
Publish At:2020-09-04 12:08 | Read:215 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Malware Mob

Hackers Are Targeting a Three-Year Old Vulnerability in QNAP NAS Devices

Recent attacks targeting QNAP Network Attached Storage (NAS) devices were attempting to exploit a vulnerability that was addressed in July 2017, 360 Netlab security researchers say. The attacker, 360 Netlab says, shows caution in exploiting the security flaw. However, the researchers were able to identify two attacker IPs, namely 219.85.109[.]
Publish At:2020-09-02 16:04 | Read:178 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities Data Protection Vulnerab

Learn How to Secure Personally Identifiable Information, Now

As more work shifts to remote, organizations continue dealing with security challenges. Employees are now connecting to internal network resources from varied devices, and many may be connecting with personal devices. Working from off-site locations presents more chances for accidental and malicious data disclosure alike. Protecting personally identifiable
Publish At:2020-08-31 14:24 | Read:213 | Comments:0 | Tags:Data Protection Data Loss Prevention (DLP) Encryption Person

New Attacks Allow Bypassing EMV Card PIN Verification

Researchers with ETH Zurich have identified vulnerabilities in the implementation of the payment card EMV standard that allow for the mounting of attacks targeting both the cardholder and the merchant.In a newly published paper, David Basin, Ralf Sasse, and Jorge Toro-Pozo from the department of computer science at ETH Zurich, explain that vulnerabilities id
Publish At:2020-08-28 15:01 | Read:189 | Comments:0 | Tags:NEWS & INDUSTRY Fraud & Identity Theft Identity &

'Add Photo' Feature on Turkey's Virus App Sparks Alarm

Turkey's coronavirus tracking app is facing fire from privacy advocates for adding a feature allowing users to report social distancing rule violations, with the option to send photos.Critics say the function breaches civil liberties and promotes a "culture of denunciation".Turkish officials counter that the measure is needed to save lives and does not viola
Publish At:2020-08-26 00:26 | Read:215 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Data Protection Tracking & L

How Can Enterprises Protect Personally Identifiable Information?

With data breaches often appearing in the news, customers and enterprise leaders alike may be concerned that the enterprise isn’t doing enough to protect customers’ personally identifiable infomation (PII). As today’s chaotic economy makes for a hungry threat landscape, what methods can the enterprise apply to better protect the increased
Publish At:2020-08-24 10:26 | Read:332 | Comments:0 | Tags:Data Protection Identity & Access Risk Management Data Breac

Tools

Tag Cloud