HackDig : Dig high-quality web security articles for hacker

How encryption can help startups in protecting their data

The deployment of encryption in modern businesses does not only guarantee hundred percent security but it also reduces the surface of attack. Data protection has become the top objective for many businesses in the world today. Especially after the ransomware incident, hacked credit card databases and the Apple leak. Businesses are scratching their heads in a
Publish At:2017-07-15 13:05 | Read:882 | Comments:0 | Tags:Security Cybersecurity encryption

GMR-2 issues allow satellite phone communications decryption in near real-time

Researchers have exploited vulnerabilities in the implementation of the GMR-2 cipher decrypt satellite phone communications in fractions of a second. Two Chinese security researchers have exploited vulnerabilities in the implementation of the GMR-2 standard that could be exploited to decrypt satellite phone communications in fractions of a second. The GMR-2
Publish At:2017-07-08 15:25 | Read:1083 | Comments:0 | Tags:Breaking News Hacking encryption GMR-2 mobile Satellite sate

The author of the original Petya ransomware released the master key

The author of the original variant of the Petya ransomware has made the master key available online, all the victims can decrypt their files for free. Janus, the author of the original variant of Petya ransomware (that isn’t the NotPetya variant used in the recent massive attack) has made the master key available online. All the victims of the original
Publish At:2017-07-07 21:00 | Read:783 | Comments:0 | Tags:Breaking News Malware Cybercrime decryptor encryption Hackin

Cracking Java’s weak encryption – Nail in the JKS coffin

POC||GTFO journal edition 0x15 came out a while ago and I’m happy to have contributed the article “Nail in the JKS coffin”. You should really read the article, I’m not going to repeat myself here. I’ve also made the code available on my “JKS private key cracker hashcat” github repository. For those who really need a
Publish At:2017-07-07 05:55 | Read:822 | Comments:0 | Tags:Password cracking Android encryption hashcat Hashes Java JKS

Security researchers Crack 1024-bit RSA Encryption in GnuPG Crypto Library

Experts have devised a side-channel attack on RSA secret keys that allowed to crack 1024-bit RSA Encryption in GnuPG Crypto Library. Security researchers have found a critical vulnerability, tracked as CVE-2017-7526, in a Gnu Privacy Guard (aka (GnuPG or GPG) cryptographic library that allowed them cracking RSA-1024 and extract the RSA key to decrypt data.
Publish At:2017-07-04 19:20 | Read:713 | Comments:0 | Tags:Breaking News Hacking cache attack collision entropy encrypt

KSN Report: Ransomware in 2016-2017

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period, as well as research into the ransomware threat landscape by Kaspersky Lab experts. Thi
Publish At:2017-06-26 07:20 | Read:669 | Comments:0 | Tags:Featured Publications Encryption Financial malware Malware S

Theresa May says ‘enough is enough’ after the London Bridge terror attack

Commenting the London Bridge terror attack, Prime Minister says there is ‘far too much tolerance of extremism’ in the UK and urges Internet regulation. The London Bridge terror attack is fueling the debate about the Internet regulation, the Prime Minister Theresa May believe the terrorists had ‘safe spaces’ online and this is no more acceptable.
Publish At:2017-06-04 20:45 | Read:1260 | Comments:0 | Tags:Breaking News Laws and regulations Security Terrorism encryp

Don’t Leave Home Without These Five Travel Security Tips

It’s vacation time for many of us, and that means it’s Christmas for criminals. In their eagerness to experience all the wonders of leisure destinations, travelers are prone to overlooking risks to their physical and digital security. Crooks know this, which is why they target people carrying cameras, sporting backpacks or exhibiting other signs
Publish At:2017-05-25 13:35 | Read:958 | Comments:0 | Tags:Data Protection Identity & Access Mobile Security Authentica

Wanadecrypt allows to recover files from Windows XP PCs infected by WannaCry without paying ransom

A security researcher developed a tool called wanadecrypt to restore encrypted files from Windows XP PCs infected by the WannaCry ransomware. The WannaCry ransomware made the headlines with the massive attack that hit systems worldwide during the weekend. The malicious code infected more than 200,000 computers across 150 countries in a matter of hours, it le
Publish At:2017-05-19 11:10 | Read:871 | Comments:0 | Tags:Breaking News Cyber Crime Malware encryption Hacking malware

WannaCry FAQ: What you need to know today

Friday May 12th marked the start of the dizzying madness that has been ‘WannaCry’, the largest ransomware infection in history. Defenders have been running around with their heads on fire trying to get ahead of the infection and to understand the malware’s capabilities. In the process, a lot of wires have gotten crossed and we figured it
Publish At:2017-05-15 13:40 | Read:1608 | Comments:0 | Tags:Blog Featured Research Encryption Malware Descriptions Ranso

WannaCry ransomware used in widespread attacks all over the world

Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world. In these attacks, data is encrypted with the extension “.WCRY” added to the filenames. Our analysis indicates the attack, dubbed “WannaCry”, is initiated through an SMBv2 remote code execution in Microsoft Windows. This
Publish At:2017-05-13 11:15 | Read:1224 | Comments:0 | Tags:Blog Incidents Encryption Malware Descriptions Ransomware Vu

UK Government’s secret programme for mass surveillance on internet and phones leaked

According to a draft document leaked online, UK Government is assigning itself more powers to spy on live communications and use malware for surveillance. While the NSA is announcing it will stop surveillance activities on emails, texts, and other internet communications, the UK government has secretly drawn up more details of its new bulk surveillance power
Publish At:2017-05-07 10:15 | Read:888 | Comments:0 | Tags:Breaking News Digital ID Intelligence Laws and regulations e

Cryptology for Business and Organizations on the 21st century

Cryptology is the mathematical foundation of penetration testing and can be adopted as a resource for securing assets and communications. An overview of the science of the occult, that brings forth a new level of security in the age of digital privacy. Cryptology is the mathematical foundation of penetration testing and can be adopted as a resource for secur
Publish At:2017-04-28 15:05 | Read:810 | Comments:0 | Tags:Breaking News Security Cryptology encryption Hacking

Europol, European police agencies and private actors dismantled cybercrime ring

The Europol coordinated an international operation that dismantled a cybercrime ring that was offering services and tools to conceal malware. The Europol dismantled a cybercrime ring as the result of a joint investigation conducted by Spanish and British law enforcement authorities (The Spanish National Police, the UK’s Regional Cyber Crime Unit for Tacklin
Publish At:2017-04-26 07:51 | Read:1101 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime cybercrime ring

Ransomware in targeted attacks

Ransomware’s popularity has attracted the attention of cybercriminal gangs; they use these malicious programs in targeted attacks on large organizations in order to steal money. In late 2016, we detected an increase in the number of attacks, the main goal of which was to launch an encryptor on an organization’s network nodes and servers. This is
Publish At:2017-04-04 23:30 | Read:1321 | Comments:0 | Tags:Blog Featured SAS Encryption Ransomware Targeted Attacks


Share high-quality web security related articles with you:)


Tag Cloud