HackDig : Dig high-quality web security articles for hackers

Five Eyes nations plus India and Japan call for encryption backdoor once again

Members of the Five Eyes intelligence alliance once again call for tech firms to engineer backdoors into end-to-end and device encryption. States of the Five Eyes intelligence alliance (US, UK, Canada, Australia, and New Zealand), plus Japan and India, once again call for tech firms to implement backdoors into end-to-end and device encryption. “We, the
Publish At:2020-10-13 03:25 | Read:176 | Comments:0 | Tags:Breaking News Laws and regulations backdoor encryption Five

Ransomware Attacks: How to Protect your Data With Encryption

Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. Recently, the University of California San Francisco fell victim to a ransomware attack on key academic and research data (the institution is known to be working on a cure for COVID-19) and ended up paying over $1.14
Publish At:2020-09-04 12:08 | Read:305 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Malware Mob

Learn How to Secure Personally Identifiable Information, Now

As more work shifts to remote, organizations continue dealing with security challenges. Employees are now connecting to internal network resources from varied devices, and many may be connecting with personal devices. Working from off-site locations presents more chances for accidental and malicious data disclosure alike. Protecting personally identifiable
Publish At:2020-08-31 14:24 | Read:342 | Comments:0 | Tags:Data Protection Data Loss Prevention (DLP) Encryption Person

How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That data could involve military campaigns, plots to overthrow political leaders or political dealings. In some cases, the use of en
Publish At:2020-08-03 12:25 | Read:375 | Comments:0 | Tags:Data Protection Cybersecurity data encryption Data Security

EncroChat system eavesdropped on by law enforcement

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security of your device. This text caused a lot of aggravation, worries, and sleepless nights. No one wants to hear the security of their device has been compromised by a malware attack. The good news is that the actual victims of this malware attack wer
Publish At:2020-07-22 16:05 | Read:530 | Comments:0 | Tags:Hacking cryptophone encrochat encryption end-to-end encrypti

Kinda sorta weakened version of EARN IT Act creeps closer

byLisa VaasThere are gut-churning tales of online child sexual abuse material (CSAM). Last week, when a bill designed to strip legal protection from online abusers sailed through the Senate Judiciary Committee, UC/Berkeley Professor Hany Farid passed on this example from investigators at the Department of Justice’s Child Exploitation and Obscenity Section:
Publish At:2020-07-08 08:00 | Read:383 | Comments:0 | Tags:Cryptography Government security Law & order #nobackdoors Ba

European police infiltrate and dismantled EncroChat chat network

A joint operation conducted by European police arrested hundreds of criminals after that agents infiltrated into EncroChat encrypted chat network. In a joint operation conducted by European and British law enforcement agencies resulted in the arrest of hundreds of alleged drug dealers and other crooks. The police infiltrated into a global network of an en
Publish At:2020-07-04 14:32 | Read:653 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime EncroChat encry

United States wants HTTPS for all government sites, all the time

byPaul DucklinThe US government just announced its plans for HTTPS on all dot-gov sites.HTTPS, of course, is short for for “secure HTTP”, and it’s the system that puts the padlock in your browser’s address bar.Actually, the government is going one step further than that.As well as saying all dot-gov sites should be available over HTTP
Publish At:2020-06-23 12:49 | Read:417 | Comments:0 | Tags:Uncategorized Encryption https TLS US government web securit

IBM releases open-source toolkits implementing FHE to process data while encrypted

IBM has released open-source toolkits implementing fully homomorphic encryption (FHE) that allow researchers to process data while it’s still encrypted. IBM has released open-source toolkits implementing fully homomorphic encryption (FHE), which allows researchers to process encrypted data without having access to the actual data. The toolkits release
Publish At:2020-06-08 05:23 | Read:588 | Comments:0 | Tags:Breaking News Security encryption FHE information security n

Contact Tracing: De-mystifying How an App Designed to Track People Can Ensure User Privacy and Security

Many governments in many countries around the world recognise that contact tracing plays a very important part to reduce the spread of the deadly disease, COVID-19. In this article, we take a look at the conventional method of contact tracking and comparing it against how technology helps contact tracing and its pro’s and con’s.Traditional contact tracing is
Publish At:2020-06-02 06:01 | Read:626 | Comments:0 | Tags:Healthcare Contact Tracing COVID-19 data privacy encryption

Going dark: encryption and law enforcement

UPDATE, 05/22/2020: In the advent of the EARN IT Act, the debate on government subversion of encryption has reignited.  Given that the material conditions of the technology have not changed, and the arguments given in favor of the bill are not novel, we’ve decided to republish the following blog outlining our stance on the subject. Originally published
Publish At:2020-05-24 07:20 | Read:621 | Comments:0 | Tags:Government Privacy Security world backdoor Department of Jus

How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address many work-from-home cybersecurity challenges — such as secure end-to-end encryption a
Publish At:2020-05-24 06:18 | Read:532 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ac

Introducing Malwarebytes Privacy

Here at Malwarebytes, we’re no strangers to using virtual private networks (VPNs) to protect our privacy while browsing online. Regular readers of our blog will remember that we’ve advised on VPN usage on many occasions, whether for mobile device users looking for anonymity or business owners wanting additional authentication protocols. We believe VPNs are a
Publish At:2020-05-03 14:39 | Read:706 | Comments:0 | Tags:Malwarebytes news Data privacy encryption IP address Malware

L4NC34 Ransomware’s Encryption Routine Reversed by Researchers

Security researchers reversed the encryption routine employed by L4NC34 ransomware by decrypting a file without paying the ransom.Sucuri Security first encountered L4NC34 ransomware when it began investigating an attack in which a malicious actor encrypted all website files and appended “.crypt” to their file names.The security firm dug a bit dee
Publish At:2020-04-07 08:18 | Read:1034 | Comments:0 | Tags:IT Security and Data Protection Latest Security News encrypt

WildPressure targets industrial-related entities in the Middle East

In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum. All the victims we registered were organizations from the Middle East. At least some of them are related to industrial sector. Our Kaspersky Threat Attribution Engine (KTAE) doesn’t show any code similarities with known campaigns. Nor h
Publish At:2020-03-24 06:44 | Read:898 | Comments:0 | Tags:APT reports Featured Encryption Industrial threats Malware D

Tools

Tag Cloud