HackDig : Dig high-quality web security articles for hacker

China widely disrupted WhatsApp in the country, broadening online censorship

The popular instant messaging application WhatsApp has been widely blocked in mainland China by the Government broadening online censorship. Bad news for the Chinese users of the popular instant messaging app WhatsApp because the application has been widely blocked in mainland China by the Government. Users are not able to send text messages, photo and video
Publish At:2017-09-27 05:25 | Read:189 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations ban Censorship

Java Key Store (JKS) format is weak and insecure

While preparing my talk for the marvelous BSides Zurich I noticed again how nearly nobody on the Internet warns you that Java’s JKS file format is weak and insecure. While users only need to use very strong passwords and keep the Key Store file secret to be on the safe side (for now!), I think it is important to tell people when a technology is weak. P
Publish At:2017-09-19 16:25 | Read:159 | Comments:0 | Tags:Password cracking encryption Java Java Key Store JKS

Chrome will label Resources delivered via FTP as “Not Secure”

Google continues the ongoing effort to communicate the transport security status of a given page labeling resources delivered via FTP as “Not secure” in Chrome, Last week, Google announced that future versions of Chrome will label resources delivered via the File Transfer Protocol (FTP) as “Not secure.” The security improvement will be implement
Publish At:2017-09-18 00:05 | Read:209 | Comments:0 | Tags:Breaking News Security Chrome encryption FTP Google HTTPS

Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes

Organizations continue to be plagued by data breaches, and data is leaking from our enterprises in large quantities. However, data leakage is not the only issue. The problems — namely, regulatory fines, brand damage and lost revenue — begin when sensitive data that is readable and accessible falls into the wrong hands. Despite these concerns, security profes
Publish At:2017-08-29 10:15 | Read:296 | Comments:0 | Tags:Data Protection Cryptography Data Security Encryption Encryp

The Power of Pervasive Encryption

The new z14 mainframe computer offers a chance to re-evaluate what a mainframe can do for an organization. Gone are the days when the mainframe was the only way to do computing. Today, there are new and different choices, and the z14 can make those choices practical. The z14 features standard improvements that users have come to expect, such as faster, mor
Publish At:2017-08-15 11:45 | Read:427 | Comments:0 | Tags:Data Protection Mainframe Compliance Cryptography Data Secur

The return of Mamba ransomware

At the end of 2016, there was a major attack against San Francisco’s Municipal Transportation Agency. The attack was done using Mamba ransomware. This ransomware uses a legitimate utility called DiskCryptor for full disk encryption. This month, we noted that the group behind this ransomware has resumed their attacks against corporations. Attack Geogra
Publish At:2017-08-09 10:25 | Read:355 | Comments:0 | Tags:Research Encryption Malware Descriptions Ransomware Targeted

Experimental Mozilla Send service allows users share encrypted copy of huge files

Mozilla Send service allows users to make an encrypted copy of a local file, store it on a remote server, and share it with a single recipient. Mozilla has presented Send, an experimental service that allows users to make an encrypted copy of a local file, store it on a remote server, and share it with a single recipient. The service allows to easily share l
Publish At:2017-08-07 07:25 | Read:338 | Comments:0 | Tags:Breaking News Security encryption file sharing Hacking Mozil

Facebook COO Sheryl Sandberg on Crypto weakening: Crypto War 2.0

Sheryl Sandberg on crypto weakening. The new Crypto war being started where government agencies are wanting a reduction in encryption strengths. DISCLAIMER: All views and facts explained in this article are the views of the author and does not in anyway related to the views of organization where the individual is employed. The article is an observation based
Publish At:2017-08-04 21:15 | Read:952 | Comments:0 | Tags:Breaking News Cyber Crime cyber security encryption surveill

Pervasive Encryption Simplifies Mainframe Security

On July 17, IBM unveiled its z14 mainframe server, which combines the traditional mainframe hardware with new capabilities in areas such as cloud, cognitive, analytics, application management, blockchain, machine learning and more. Most importantly, z14 includes enhanced security features — namely, pervasive encryption — to help clients stay one step ahead
Publish At:2017-08-04 20:10 | Read:899 | Comments:0 | Tags:Data Protection Mainframe Application Security Encryption En

Mainframe Data Is Your Secret Sauce: A Recipe for Data Protection

We in the security field like to use metaphors to help illustrate the significance of data in the enterprise. I’m a big fan of cooking, so I’ll use the metaphor of a secret sauce. Think about it: Each transaction basically reflects your organization’s unique relationship with a customer, supplier or partner. By sheer quantity alone, mainfra
Publish At:2017-07-31 23:40 | Read:461 | Comments:0 | Tags:Data Protection Mainframe Compliance Encryption Mainframe Se

Achieve the Ultimate Data Protection for Your Trusted Digital Experience

The industry just gained another ally in the global fight against cybercrime with the launch of the new IBM z14 mainframe. With close to 70 percent of the world’s largest businesses — including those in banking, health care, insurance and retail — running on mainframes, IBM z not only increases power and speed to handle enormous transactions, but also
Publish At:2017-07-17 19:15 | Read:411 | Comments:0 | Tags:Mainframe Compliance Data Privacy Data Protection Encryption

How encryption can help startups in protecting their data

The deployment of encryption in modern businesses does not only guarantee hundred percent security but it also reduces the surface of attack. Data protection has become the top objective for many businesses in the world today. Especially after the ransomware incident, hacked credit card databases and the Apple leak. Businesses are scratching their heads in a
Publish At:2017-07-15 13:05 | Read:519 | Comments:0 | Tags:Security Cybersecurity encryption

GMR-2 issues allow satellite phone communications decryption in near real-time

Researchers have exploited vulnerabilities in the implementation of the GMR-2 cipher decrypt satellite phone communications in fractions of a second. Two Chinese security researchers have exploited vulnerabilities in the implementation of the GMR-2 standard that could be exploited to decrypt satellite phone communications in fractions of a second. The GMR-2
Publish At:2017-07-08 15:25 | Read:622 | Comments:0 | Tags:Breaking News Hacking encryption GMR-2 mobile Satellite sate

The author of the original Petya ransomware released the master key

The author of the original variant of the Petya ransomware has made the master key available online, all the victims can decrypt their files for free. Janus, the author of the original variant of Petya ransomware (that isn’t the NotPetya variant used in the recent massive attack) has made the master key available online. All the victims of the original
Publish At:2017-07-07 21:00 | Read:524 | Comments:0 | Tags:Breaking News Malware Cybercrime decryptor encryption Hackin

Cracking Java’s weak encryption – Nail in the JKS coffin

POC||GTFO journal edition 0x15 came out a while ago and I’m happy to have contributed the article “Nail in the JKS coffin”. You should really read the article, I’m not going to repeat myself here. I’ve also made the code available on my “JKS private key cracker hashcat” github repository. For those who really need a
Publish At:2017-07-07 05:55 | Read:481 | Comments:0 | Tags:Password cracking Android encryption hashcat Hashes Java JKS


Share high-quality web security related articles with you:)


Tag Cloud