HackDig : Dig high-quality web security articles for hackers

What’s up with WhatsApp’s privacy policy?

WhatsApp has been in the news recently after changes to its privacy policy caused a surge of interest in rival messaging app Signal. Initial reports may have worried a lot of folks, leading to inevitable clarifications and corrections. But what, you may ask, actually happened? Is there a problem? Are you at risk? Or should you keep using your apps as you wer
Publish At:2021-01-18 12:24 | Read:88 | Comments:0 | Tags:Privacy data data collection encryption facebook messaging p

Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy

They come in the mail — ominous-looking envelopes that are devoid of branding and obvious marketing embellishments. Plain white, marked with often-unrecognizable return addresses, and relatively thin — the contents of which will spoil your day and cause you to lose yet a bit more faith in humanity. No, it’s not a tax bill; rather, it&rsquo
Publish At:2020-12-17 09:29 | Read:168 | Comments:0 | Tags:Data Protection Security Services data encryption Data Priva

Why is encryption essential for modern day communications?

As we all are patiently waiting for 2020 to be over, it is easy to say that humanity has become significantly more dependent on technology, especially online communications. Nowadays, most of the communications that we do on personal and business levels are conducted online using smartphones, tablets, and computers. Many messages and video conferencing provi
Publish At:2020-12-14 13:40 | Read:159 | Comments:0 | Tags:Mobile News Security advanced cybersecurity corporate encryp

How to Use Apple’s Built-in Features to Encrypt Files and Folders

The best way to protect your data is to encrypt your files, ensuring that, even if they get into the hands of hackers or cybercriminals, no one can access your personal data. macOS provides a suite of tools to protect you, and, in this article, I’ll discuss the many ways you can use built-in macOS features to provide unbreakable encryption. (Unbreakabl
Publish At:2020-11-24 02:08 | Read:289 | Comments:0 | Tags:Software & Apps Apple encryption FileVault OS X Print to PDF

RansomEXX Trojan attacks Linux systems

We recently discovered a new file-encrypting Trojan built as an ELF executable and intended to encrypt data on machines controlled by Linux-based operating systems. After the initial analysis we noticed similarities in the code of the Trojan, the text of the ransom notes and the general approach to extortion, which suggested that we had in fact encountered a
Publish At:2020-11-06 11:47 | Read:350 | Comments:0 | Tags:Featured Malware descriptions Encryption Linux Malware Descr

Will Quantum Computing Change Computer Security? – Intego Mac Podcast Episode 159

Quantum computing is just around the corner, and it will affect the way computer security works. Strong passwords and encryption will be cracked, and we’ll need new ways to secure our data and identity. We also discuss complaints against Apple’s coming anti-tracking protection in iOS, and we revisit the suggestions that Apple may build its own se
Publish At:2020-10-29 13:49 | Read:373 | Comments:0 | Tags:Intego Mac Security Podcast encryption quantum computing sec

How Quantum Computing Will Affect Computer Security and Passwords

One of the key elements in securing or data and our identities is the use of strong passwords. Using passwords that can’t be guessed—unlike the perennial favorites 123456 or password—helps ensure that hackers and cybercriminals can’t access your computer, mobile device, or websites where you’ve created accounts, and can’t steal your i
Publish At:2020-10-29 09:00 | Read:232 | Comments:0 | Tags:Security & Privacy encryption passwords security

Five Eyes nations plus India and Japan call for encryption backdoor once again

Members of the Five Eyes intelligence alliance once again call for tech firms to engineer backdoors into end-to-end and device encryption. States of the Five Eyes intelligence alliance (US, UK, Canada, Australia, and New Zealand), plus Japan and India, once again call for tech firms to implement backdoors into end-to-end and device encryption. “We, the
Publish At:2020-10-13 03:25 | Read:629 | Comments:0 | Tags:Breaking News Laws and regulations backdoor encryption Five

Ransomware Attacks: How to Protect your Data With Encryption

Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. Recently, the University of California San Francisco fell victim to a ransomware attack on key academic and research data (the institution is known to be working on a cure for COVID-19) and ended up paying over $1.14
Publish At:2020-09-04 12:08 | Read:546 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Malware Mob

Learn How to Secure Personally Identifiable Information, Now

As more work shifts to remote, organizations continue dealing with security challenges. Employees are now connecting to internal network resources from varied devices, and many may be connecting with personal devices. Working from off-site locations presents more chances for accidental and malicious data disclosure alike. Protecting personally identifiable
Publish At:2020-08-31 14:24 | Read:668 | Comments:0 | Tags:Data Protection Data Loss Prevention (DLP) Encryption Person

How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That data could involve military campaigns, plots to overthrow political leaders or political dealings. In some cases, the use of en
Publish At:2020-08-03 12:25 | Read:598 | Comments:0 | Tags:Data Protection Cybersecurity data encryption Data Security

EncroChat system eavesdropped on by law enforcement

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security of your device. This text caused a lot of aggravation, worries, and sleepless nights. No one wants to hear the security of their device has been compromised by a malware attack. The good news is that the actual victims of this malware attack wer
Publish At:2020-07-22 16:05 | Read:724 | Comments:0 | Tags:Hacking cryptophone encrochat encryption end-to-end encrypti

Kinda sorta weakened version of EARN IT Act creeps closer

byLisa VaasThere are gut-churning tales of online child sexual abuse material (CSAM). Last week, when a bill designed to strip legal protection from online abusers sailed through the Senate Judiciary Committee, UC/Berkeley Professor Hany Farid passed on this example from investigators at the Department of Justice’s Child Exploitation and Obscenity Section:
Publish At:2020-07-08 08:00 | Read:689 | Comments:0 | Tags:Cryptography Government security Law & order #nobackdoors Ba

European police infiltrate and dismantled EncroChat chat network

A joint operation conducted by European police arrested hundreds of criminals after that agents infiltrated into EncroChat encrypted chat network. In a joint operation conducted by European and British law enforcement agencies resulted in the arrest of hundreds of alleged drug dealers and other crooks. The police infiltrated into a global network of an en
Publish At:2020-07-04 14:32 | Read:1048 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime EncroChat encry

United States wants HTTPS for all government sites, all the time

byPaul DucklinThe US government just announced its plans for HTTPS on all dot-gov sites.HTTPS, of course, is short for for “secure HTTP”, and it’s the system that puts the padlock in your browser’s address bar.Actually, the government is going one step further than that.As well as saying all dot-gov sites should be available over HTTP
Publish At:2020-06-23 12:49 | Read:680 | Comments:0 | Tags:Uncategorized Encryption https TLS US government web securit

Tools

Tag Cloud