HackDig : Dig high-quality web security articles for hackers

Explosive technology and 3D printers: a history of deadly devices

Hackers: They’ll turn your computer into a BOMB! “Hackers turning computers into bombs” is a now legendary headline, taken from the Weekly World News. It has rather set the bar for “people will murder you with computers” anxiety. Even those familiar with the headline may not have dug into the story too much on account of how silly
Publish At:2020-08-14 19:52 | Read:346 | Comments:0 | Tags:Hacking 3d printer hackers hacking hacks hardware IoT malwar

Exclusive, Ghost Squad Hackers defaced European Space Agency (ESA) site

A group of hacktivists that goes online with the name Ghost Squad Hackers has defaced a site of the European Space Agency (ESA). A group of hackers that goes online with the name Ghost Squad Hackers has defaced a site of the European Space Agency (ESA), https://business.esa.int/. I have reached them for a comment and they told me that the atta
Publish At:2020-07-15 09:12 | Read:366 | Comments:0 | Tags:Breaking News Hacking Hacktivism ESA Ghost Squad Hackers Hac

What is Hacktivism? Campaigns That Shaped the Movement

From protests and sit-ins to doxxing and distributed denial-of-service attacks, a new kind of activism rose in the ranks. In 1996, cyber-activism gained a reputation and was given a new name: hacktivism. Consisting of breaking into a computer system for political, social, religious, or anarchistic reasons, hackers began to wage a war on information. Proven t
Publish At:2020-06-23 14:16 | Read:379 | Comments:0 | Tags:Technology cyberattacks Hackers hacking infographic

Hackers Are Stealing Your Cookies

Cookies can do a lot more than just track your web browsing activity. Now it appears that hackers have found a way to steal your passwords too. What are computer cookies? A cookie is a tiny file that websites store on your computer. They are normally perfectly harmless – and quite useful too. In fact, many of the websites you use every day rely on cook
Publish At:2020-05-03 10:16 | Read:618 | Comments:0 | Tags:Mobile News Security cookies Hackers

US offers up to $5m reward for information on North Korean hackers

byLisa VaasKnow anything about North Korean hackers and their activities in cyberspace, past or ongoing?The US on Wednesday said that it’s got up to $5 million in Rewards for Justice money if you cough up useful details, which you can do here.The FBI and the Departments of State, Treasury, and Homeland Security (DHS) put out an advisory about the persi
Publish At:2020-04-17 07:07 | Read:741 | Comments:0 | Tags:Cryptocurrency Government security Law & order Security thre

Hackers use hackers spreading tainted hacking tools in long-running campaign

Who is hacking the hackers? Experts from Cybereason a mysterious hackers group is targeting other hackers by spreading tainted hacking tools. Experts from security firm Cybereason warn of a mysterious group of hackers that are distributing trojanized hacking tools on an almost daily basis for the past years. These hacking tools are used by fellow hack
Publish At:2020-03-10 12:40 | Read:513 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Hackers hacking tools info

IOTA cryptocurrency shuts down entire network after a coordinated attack on its Trinity wallet

IOTA Foundation behind the IOTA cryptocurrency was forced to shut down its entire network following a cyber attack that resulted in the theft of funds. Hackers have exploited a vulnerability in the official IOTA wallet to steal funds from the users. In response to the incident, the IOTA Foundation, the nonprofit organization behind the IOTA cryptocurrenc
Publish At:2020-02-16 08:00 | Read:1120 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking crypocurrency C

Hackers backed by foreign states attacked 12,000 Google users

Government-supported hackers tried to steal 12,000 Google credentials in 2019 Google’s Threat Analysis Group (TAG) revealed in a report that they distributed more than 12,000 warnings to users in nearly 150 countries that include the United States of America. The recipients were notified that they have been subject of state-sponsored phishing attempts.
Publish At:2019-12-17 09:15 | Read:1123 | Comments:0 | Tags:Mobile News Security Cybercrime Google Hackers

Corporate security prediction 2020

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Cyberthreats to financial institutions 2020: Overview and predictions Moving to the cloud The popularity of cloud services is growing, and threat actors are here to exploit the trend. We
Publish At:2019-12-03 06:05 | Read:1322 | Comments:0 | Tags:Kaspersky Security Bulletin Cloud Computing Cyber espionage

15 Easy, Effective Ways to Start Winning Back Your Online Privacy

Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a few minutes. I certainly don’t need any more stuff. However, if I could name one gift that would make me absolutely giddy, it would be getting a chunk of my privacy back. Like most people, the internet knows way too much about me — my age, address, phone
Publish At:2019-10-12 11:20 | Read:1732 | Comments:0 | Tags:Family Safety ad blockers children's privacy cloud security

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public. So forget hacking, cybercriminals can just take a str
Publish At:2019-09-24 23:20 | Read:10381 | Comments:0 | Tags:Hacking cam camera devices hackers hacking hub Internet of T

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success rate. This is because c
Publish At:2017-10-23 23:40 | Read:4820 | Comments:0 | Tags:Company News CISO defense dilemma end users hackers infograp

Bionic employees and biohacking

Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work. But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Publish At:2017-09-26 20:45 | Read:3988 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

BlueBorne Bluetooth hack could affect millions of smartphones

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time. But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use
Publish At:2017-09-15 08:00 | Read:4683 | Comments:0 | Tags:Mobile News Mobile Security Android Hackers Malware

Why is Online Voting Not a Good Idea?

Online voting could introduce great risk into the election system by threatening voters It’s the 21st century, and we are living in the future as technology is advancing at a rapid speed. It has never been easier to shop online and to do online banking. It is possible money will even cease to exist as blockchain digital currencies such as Bitcoin and Monero
Publish At:2017-09-12 06:15 | Read:4407 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Tools

Tag Cloud