HackDig : Dig high-quality web security articles for hackers

Home schooling – how to stay secure

bySally AdamMany pupils are starting their new school term from home rather than the classroom.For families with younger kids, home schooling is often the first time that their children have needed to use computers (rather than gaming consoles) in earnest.Whether you’re new to home schooling, going back to it after a break, or an old hand, it’s worth taking
Publish At:2021-01-13 13:43 | Read:161 | Comments:0 | Tags:app devices mac password PC Privacy Wi-fi

Realizing Hybrid Asset Discovery with Tripwire Industrial Appliance

Digital attacks continue to weigh on the minds of industrial cybersecurity (ICS) professionals. In a 2019 survey, 88% of ICS experts told Tripwire they were worried about what a digital attack could mean for their industrial organization. The rate was even higher for those working in the manufacturing and oil & gas sectors at 89% and 97%, respectively.Su
Publish At:2020-04-15 00:01 | Read:1248 | Comments:0 | Tags:ICS Security asset discovery Devices ics

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public. So forget hacking, cybercriminals can just take a str
Publish At:2019-09-24 23:20 | Read:10818 | Comments:0 | Tags:Hacking cam camera devices hackers hacking hub Internet of T

New Security Measure in the US and UK: Tablets Banned on Some Flights

Laptops, handheld video games, cameras, tablets… unless it has some sort of medical use, all electronic devices bigger than a smartphone will be banned from the cabin of all flights originating in North Africa and the Middle East and bound for the US or UK. The Trump administration announced the drastic measure, which will affect ten airports in Jordan
Publish At:2017-04-03 21:50 | Read:5444 | Comments:0 | Tags:News devices flights security

The Apps That Most Frequently Appear on Companies’ Blacklists

Apps installed on smartphones and tablets are considered to be one of the biggest risks for companies today. And for good reason. In addition to diminishing the performance of the devices themselves, they can become the gateway to mobile and corporate tablets for cybercriminals. Because of this, IT departments should be wary of employees downloading certain
Publish At:2017-03-24 03:45 | Read:4660 | Comments:0 | Tags:Security apps businesses devices

Can we trust our computers? Many have been tampered with during the manufacturing process.

How can you prevent a manufacturing sabotage from becoming an IT disaster? Securing your company’s network with the right protection measures isn’t always enough. Of course you should install an adequate protection system and ensure that your employees use robust passwords. However, there is something that we cannot control: the manufacturing process.
Publish At:2016-10-17 16:10 | Read:3553 | Comments:0 | Tags:News businesses cybersecurity devices

The Industrial Internet of Things: Fueling a New Industrial Revolution

A transformative event is occurring where countless industrial devices, both old and new, are beginning to use Internet Protocol communication technologies.We refer to these collections of IP-enabled industrial devices and associated networks as the Industrial Internet of Things (IIoT). The Industrial IoT is at the very core of disruptive visions, such as In
Publish At:2015-11-30 04:05 | Read:5694 | Comments:0 | Tags:Featured Articles ICS Security IoT Devices IIoT Industrial P

Tools

Tag Cloud