HackDig : Dig high-quality web security articles for hacker

HBO hacked: Not even Daenerys dragons can protect Game of Thrones from leak

As you have probably heard already, hackers might be holding 1.5 terabytes of HBO proprietary information. No one knows what kind of information they have managed to steal, but one is for sure, the Game of Thrones script for season 7 has been reported as leaked. On Sunday afternoon reporters received an anonymous email saying: “Hi to all mankind. The greates
Publish At:2017-08-02 04:55 | Read:2302 | Comments:0 | Tags:Mobile News News cyberattack Game of thrones hack HBO

Multiple Critical Vulnerabilities Found in Popular Motorized Hoverboards

By Thomas KilbrideNot that long ago, motorized hoverboards were in the news – according to widespread reports, they had a tendency to catch on fire and even explode. Hoverboards were so dangerous that the National Association of State Fire Marshals (NASFM) issued a statement recommending consumers “look for indications of acceptance by reco
Publish At:2017-07-19 23:45 | Read:3629 | Comments:0 | Tags:break hoverboard hack hoverboard hoverboard hack ioactive io

iCloud Hacking: The Cybersecurity Gift that Keeps on Giving

You probably remember the massive iCloud breach in 2014 that resulted in compromised celebrity photos spreading through the internet like wildfire. That egregious invasion of privacy caused great embarrassment and damage to the reputations of nearly 100 A-list stars.Fortunately, these bad deeds did not go unpunished. In 2016, two men were brought to justice
Publish At:2017-04-03 10:15 | Read:4462 | Comments:0 | Tags:Featured Articles IT Security and Data Protection hack iClou

‘Celebgate 2.0′ Scam Collects Users’ Personal Information, Posts Twitter Spam

A new scam is capitalizing on reports of ‘Celebgate 2.0′ by making off with users’ personal information and posting spam on Twitter.According to several media outlets, hackers have published the private photos of multiple female actresses including Emma Watson, Amanda Seyfried, Dylan Penn, and others. Some are calling these leaks “Cel
Publish At:2017-03-21 08:55 | Read:3378 | Comments:0 | Tags:Latest Security News Data Leak hack scam

Third-Party Twitter Service Hacked to Push Out Nazi-Themed Tweets

Attackers hacked a third-party service and used their unauthorized access to push out Nazi-themed tweets from high-profile Twitter accounts.On 14 March, prominent companies, publishers, and personalities tweeted out messages containing swastikas and the hashtags #NaziGermany and #NaziHollan written in Turkish. It’s thought that supporters of Turkey sen
Publish At:2017-03-15 23:30 | Read:2990 | Comments:0 | Tags:Latest Security News hack third-party Twitter

23 Incident Response Tips for Home Computer Use or Unwanted Social Media Attention

One of the unpleasant realities of having a ubiquitous and very public online profile through social media is the risk of attracting an unwanted “follower” or “friend” who turns into an online-troll or stalker. Over the past few weeks, I’ve been contacted by a number of folks on “what to do” when bad things start happening online.Whether you suspect your com
Publish At:2017-03-10 11:25 | Read:2867 | Comments:0 | Tags:Featured Articles Security Awareness hack password social me

Gordon Ramsay’s Father-in-Law Charged with Hacking Chef’s Emails

Police have charged Gordon Ramsay’s father-in-law and three of his family members with hacking the celebrity chef’s emails.On 21 February, the Metropolitan Police announced charges against Chris Hutcherson, 68, along with Adam Hutcheson, Orlanda Butland, and Chris Hutcheson, 37. The four individuals are accused of having violated the Criminal Law
Publish At:2017-02-22 19:40 | Read:3252 | Comments:0 | Tags:Latest Security News email Gordon Ramsay hack

Foreign Intelligence Agency Targeted Norway’s Labour Party, Report Police

National police have notified Norway’s Labour Party parliamentary group that a foreign intelligence agency targeted its members.On 2 February, the Norwegian Police Security Service (PST) notified the Labour Party that hackers had targeted the group in autumn 2016. Labor, which is the biggest party in Norway’s Parliament, subsequently sent out a l
Publish At:2017-02-06 16:20 | Read:3734 | Comments:0 | Tags:Latest Security News hack Norway Russia

Shadow Brokers’ Swan Song: A Sale of Hacking Tools for Windows

The digital world is riddled with threat actors of which we know very little. Some of these mysterious agents launch one or two modest attacks and peter out soon after crawling their way into existence. Others last a bit longer, raising hubbub and gaining notoriety in the process.Not a lot of actors make it into the latter category without the security commu
Publish At:2017-01-16 04:30 | Read:5258 | Comments:0 | Tags:Cyber Security Featured Articles breach hack Windows

10 Questions that Need to Be Asked about Every Cybersecurity Story

The Russian hacking fiasco we’ve been following over the past weeks – hysteria, which is due to the flawed Grizzly Steppe report and subsequent haphazard news reporting – has done a grave disservice to the serious issue of national cybersecurity.If the world is going to ever turn the corner from its current state of rampant cyber(in)security, it needs
Publish At:2017-01-11 12:55 | Read:3181 | Comments:0 | Tags:Cyber Security Featured Articles breach cybersecurity DNC ha

7 Digital Security Lessons from Mr. Robot

I am going to put the spoiler warning right here in the first sentence: I am going to be talking about season two of Mr. Robot, and I’m not holding anything back. Read on if you have already watched it. If you haven’t watched it, keep reading to see how life imitates art. And if not art, then at least a cable TV show.Those of you here at The Stat
Publish At:2016-12-22 23:55 | Read:4419 | Comments:0 | Tags:Featured Articles IT Security and Data Protection hack insid

Cyber Security Risk: You Can’t Secure It If …

In the course of working with our clients to improve their security posture, I have come across several common themes that often limit a business’s ability to assess and mitigate cyber security risk. Let’s take a look at some of these themes and real-world examples of how they apply. You can’t secure it if…You Don’t Know It̵
Publish At:2016-12-15 06:50 | Read:3619 | Comments:0 | Tags:Featured Articles Risk Management BYOD hack IoT

Checking Up on the Cyberthreat Landscape in the Healthcare Sphere

According to the 2015 SANS Institute Healthcare Cyberthreat Report, a whopping 94 percent of healthcare organizations have been victims of cyberattacks. But surprisingly, only 38 percent of patients said they would “…be wary of using a hospital associated with a hacked device.”Perhaps if the other 62 percent of patients understood the potential of such
Publish At:2016-12-07 13:55 | Read:3119 | Comments:0 | Tags:Featured Articles Internet of Things Cyberthreat hack Health

Former Expedia IT Employee Who Hacked Execs Pleads Guilty to Insider Trading

A former IT technician at Expedia pleaded guilty to insider trading charges on Monday after allegedly hacking the firm’s senior executives and illegally trading on company secrets.According to prosecutors, Jonathan Ly, 28, accessed the emails of Expedia’s chief financial officer and head of investor relations, obtaining inside information on upcoming quarter
Publish At:2016-12-06 19:30 | Read:3719 | Comments:0 | Tags:Latest Security News Expedia hack insider trading

How to Secure Your Mobile Device in Six Steps

The rapidly changing technology and portability of mobile devices have forced people to heavily rely on those products. With their increased functionalities, mobile devices carry out a number of our day-to-day activities, such as surfing the web, booking appointments, setting up reminders, sharing files, instant messaging, video calling, and even mobile bank
Publish At:2016-11-24 12:45 | Read:7438 | Comments:0 | Tags:Featured Articles IT Security and Data Protection encryption


Share high-quality web security related articles with you:)


Tag Cloud