HackDig : Dig high-quality web security articles for hacker

KSN Report: Ransomware in 2016-2017

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period, as well as research into the ransomware threat landscape by Kaspersky Lab experts. Thi
Publish At:2017-06-26 07:20 | Read:390 | Comments:0 | Tags:Featured Publications Encryption Financial malware Malware S

Theresa May says ‘enough is enough’ after the London Bridge terror attack

Commenting the London Bridge terror attack, Prime Minister says there is ‘far too much tolerance of extremism’ in the UK and urges Internet regulation. The London Bridge terror attack is fueling the debate about the Internet regulation, the Prime Minister Theresa May believe the terrorists had ‘safe spaces’ online and this is no more acceptable.
Publish At:2017-06-04 20:45 | Read:753 | Comments:0 | Tags:Breaking News Laws and regulations Security Terrorism encryp

Don’t Leave Home Without These Five Travel Security Tips

It’s vacation time for many of us, and that means it’s Christmas for criminals. In their eagerness to experience all the wonders of leisure destinations, travelers are prone to overlooking risks to their physical and digital security. Crooks know this, which is why they target people carrying cameras, sporting backpacks or exhibiting other signs
Publish At:2017-05-25 13:35 | Read:637 | Comments:0 | Tags:Data Protection Identity & Access Mobile Security Authentica

Wanadecrypt allows to recover files from Windows XP PCs infected by WannaCry without paying ransom

A security researcher developed a tool called wanadecrypt to restore encrypted files from Windows XP PCs infected by the WannaCry ransomware. The WannaCry ransomware made the headlines with the massive attack that hit systems worldwide during the weekend. The malicious code infected more than 200,000 computers across 150 countries in a matter of hours, it le
Publish At:2017-05-19 11:10 | Read:519 | Comments:0 | Tags:Breaking News Cyber Crime Malware encryption Hacking malware

WannaCry FAQ: What you need to know today

Friday May 12th marked the start of the dizzying madness that has been ‘WannaCry’, the largest ransomware infection in history. Defenders have been running around with their heads on fire trying to get ahead of the infection and to understand the malware’s capabilities. In the process, a lot of wires have gotten crossed and we figured it
Publish At:2017-05-15 13:40 | Read:788 | Comments:0 | Tags:Blog Featured Research Encryption Malware Descriptions Ranso

WannaCry ransomware used in widespread attacks all over the world

Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world. In these attacks, data is encrypted with the extension “.WCRY” added to the filenames. Our analysis indicates the attack, dubbed “WannaCry”, is initiated through an SMBv2 remote code execution in Microsoft Windows. This
Publish At:2017-05-13 11:15 | Read:645 | Comments:0 | Tags:Blog Incidents Encryption Malware Descriptions Ransomware Vu

UK Government’s secret programme for mass surveillance on internet and phones leaked

According to a draft document leaked online, UK Government is assigning itself more powers to spy on live communications and use malware for surveillance. While the NSA is announcing it will stop surveillance activities on emails, texts, and other internet communications, the UK government has secretly drawn up more details of its new bulk surveillance power
Publish At:2017-05-07 10:15 | Read:577 | Comments:0 | Tags:Breaking News Digital ID Intelligence Laws and regulations e

Cryptology for Business and Organizations on the 21st century

Cryptology is the mathematical foundation of penetration testing and can be adopted as a resource for securing assets and communications. An overview of the science of the occult, that brings forth a new level of security in the age of digital privacy. Cryptology is the mathematical foundation of penetration testing and can be adopted as a resource for secur
Publish At:2017-04-28 15:05 | Read:608 | Comments:0 | Tags:Breaking News Security Cryptology encryption Hacking

Europol, European police agencies and private actors dismantled cybercrime ring

The Europol coordinated an international operation that dismantled a cybercrime ring that was offering services and tools to conceal malware. The Europol dismantled a cybercrime ring as the result of a joint investigation conducted by Spanish and British law enforcement authorities (The Spanish National Police, the UK’s Regional Cyber Crime Unit for Tacklin
Publish At:2017-04-26 07:51 | Read:777 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime cybercrime ring

Ransomware in targeted attacks

Ransomware’s popularity has attracted the attention of cybercriminal gangs; they use these malicious programs in targeted attacks on large organizations in order to steal money. In late 2016, we detected an increase in the number of attacks, the main goal of which was to launch an encryptor on an organization’s network nodes and servers. This is
Publish At:2017-04-04 23:30 | Read:883 | Comments:0 | Tags:Blog Featured SAS Encryption Ransomware Targeted Attacks

Things to Consider Before Implementing Advanced Network Security

Today’s networked world is constantly shifting, and the number and type of devices it connects changes minute by minute. The combination of in-house computing, cloud-based resources and a mobile workforce armed with a growing diversity of devices means advanced network security systems need to be both flexible and agile to detect intrusion and malware
Publish At:2017-04-03 11:00 | Read:652 | Comments:0 | Tags:Network & Endpoint Corporate Network Security Data Protectio

British interior minister says IT companies should stop offering a “secret place for terrorists to communicateR

British interior minister Amber Rudd believes encryption implemented by messaging services is offering a dangerous opportunity for terrorists to communicate. British interior minister Amber Rudd has a clear opinion on encryption implemented by many messaging services, it is no more acceptable. On Sunday the minister Amber Rudd reaffirmed that technology firm
Publish At:2017-03-27 14:05 | Read:680 | Comments:0 | Tags:Breaking News Intelligence Laws and regulations Security enc

Are You Getting the Most From Your Network Security? Five Questions to Ask

For nearly 20 years, network security solutions, including firewalls and intrusion detection and prevention systems, have been the foundational building blocks of an effective security program. However, as attack methods evolve, it is critical to determine whether your network technologies are not only keeping up with the latest threats, but also integratin
Publish At:2017-03-20 15:15 | Read:745 | Comments:0 | Tags:Network & Endpoint Encryption IBM Security Network Protectio

Enterprise Intelligence Brief: Three Experts Discuss Blockchain in Cybersecurity

There is much chatter about blockchain and how it could impact the way we do business today. Arvind Krishna, senior vice president at IBM Research, said that “over the past two decades, the internet has revolutionized many aspects of business and society … Blockchain could bring to those processes the openness and efficiency we have come to expec
Publish At:2017-03-14 11:25 | Read:2638 | Comments:0 | Tags:Fraud Protection Identity & Access Authentication Bitcoin Bl

PetrWrap: the new Petya-based ransomware used in targeted attacks

This year we found a new family of ransomware used in targeted attacks against organizations. After penetrating an organization’s network the threat actors used the PsExec tool to install ransomware on all endpoints and servers in the organization. The next interesting fact about this ransomware is that the threat actors decided to use the well-known P
Publish At:2017-03-14 11:05 | Read:1302 | Comments:0 | Tags:Blog Research Encryption Financial malware Ransomware Target


Share high-quality web security related articles with you:)


Tag Cloud