HackDig : Dig high-quality web security articles for hacker

15 Easy, Effective Ways to Start Winning Back Your Online Privacy

Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a few minutes. I certainly don’t need any more stuff. However, if I could name one gift that would make me absolutely giddy, it would be getting a chunk of my privacy back. Like most people, the internet knows way too much about me — my age, address, phone
Publish At:2019-10-12 11:20 | Read:492 | Comments:0 | Tags:Family Safety ad blockers children's privacy cloud security

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public. So forget hacking, cybercriminals can just take a str
Publish At:2019-09-24 23:20 | Read:486 | Comments:0 | Tags:Hacking cam camera devices hackers hacking hub Internet of T

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success rate. This is because c
Publish At:2017-10-23 23:40 | Read:3529 | Comments:0 | Tags:Company News CISO defense dilemma end users hackers infograp

Bionic employees and biohacking

Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work. But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Publish At:2017-09-26 20:45 | Read:3023 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

BlueBorne Bluetooth hack could affect millions of smartphones

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time. But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use
Publish At:2017-09-15 08:00 | Read:3809 | Comments:0 | Tags:Mobile News Mobile Security Android Hackers Malware

Why is Online Voting Not a Good Idea?

Online voting could introduce great risk into the election system by threatening voters It’s the 21st century, and we are living in the future as technology is advancing at a rapid speed. It has never been easier to shop online and to do online banking. It is possible money will even cease to exist as blockchain digital currencies such as Bitcoin and Monero
Publish At:2017-09-12 06:15 | Read:3359 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Are All Hackers Bad? 7 Types of Hackers

Top Seven Types of Hackers You hear about leaks and hacks on a daily basis, but most of the times the identity of the people involved in these events remain hidden from the society. Every time there is a cyber-incident, the media releases a lot of information about the damages, but you rarely get much about the hackers themselves. Sometimes names of a myster
Publish At:2017-08-30 12:35 | Read:3171 | Comments:0 | Tags:Mobile News News Security Hackers Malware tips

PlayStation Network Hacked. Again.

When mysterious tweets appeared on the official Sony PlayStation Twitter feed on Monday morning, it quickly became clear that the account had been hacked. Indeed, the hackers made little effort to hide their activities, proudly announcing that the breach had been carried out by the OurMine Security Group. Photo credit: Twitter Initially there were a few twee
Publish At:2017-08-23 14:50 | Read:3277 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

US military is working on the creation of separate unified cyber warfare command

President Donald Trump ordered the US Military to create a separate cyber warfare command tasked with cyber warfare operations. President Donald Trump wants to improve cyber capabilities of the US Military, he ordered it to create a separate cyber warfare command tasked with cyber warfare operations. President is thinking of a separate command specialized on
Publish At:2017-08-19 11:40 | Read:3188 | Comments:0 | Tags:Breaking News Cyber warfare Admiral Mike Rogers Cyber attack

Hackers target energy and utility firms

Why cyber warfare is becoming so important In the early stages of any war, the first action is to try and disrupt the infrastructure of an enemy. In recent years, this means risking people’s lives to bomb key infrastructure, like power plants, bridges and fuel depots. With key utilities crippled, society quickly breaks down, making it very hard for the count
Publish At:2017-08-18 05:50 | Read:2780 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Former Bupa employee offered 1 million customer records for sale on dark web

Former Employee of the Healthcare giant Bupa offered for sale records of 1 Million clients on Dark Web. A former employee of healthcare giant Bupa was selling between 500,000 and 1 million medical records on the dark web. The former employee whose identity remains undisclosed had sold several batches of hundreds of thousands of medical records managed by Bup
Publish At:2017-08-03 08:00 | Read:3516 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Data Breach Deep Web

The biggest cybersecurity breaches of 2017…so far

What can we learn from the latest cybersecurity breaches The frequency and impact of cybercrime has been steadily escalating for several years now, but 2017 has been one of the worst– at least in terms of media headlines. Worse still, we’re only half way through the year. So what has happened, and what can you learn? NSA hacking tools are stolen and leaked T
Publish At:2017-07-11 08:20 | Read:2597 | Comments:0 | Tags:Mobile News News cybersecurity Hackers Ransomware

Petya: New global ransomware attack

New ransomware attack similar to Wannacry spreads globally “New global ransomware attack”. This is the message that has been trending on Twitter in the last hours, accompanied by the hashtags #Ransomware and #Petya. A new type of WannaCry on a global scale is attacking businesses all over the world. And, just as in the previous international atta
Publish At:2017-06-27 12:55 | Read:2568 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers Ransomware urgent

Virgin Media customers asked to change passwords over hacking alert

800.000 Virgin Media customers advised to change their passwords over imminent hack risk Virgin Media, one of UK’s larger Internet providers, has advised more than their 800.000 customers using a specific router (Super Hub 2), to change their passwords immediately after an investigation revealed they are prone to hacking. The warning comes after ethical secu
Publish At:2017-06-23 16:50 | Read:2766 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

Are you the dream victim of a ransomware cybercriminal?

Ransomware attacks continue to be popular The recent ransomware attack against the NHS caused millions of pounds worth of damage – and put countless lives at risks when operations and general treatment had to be delayed. Despite the chaos, security experts believe that the criminals behind the attack made just $100,000 in the week after infection. Ransomware
Publish At:2017-06-16 19:05 | Read:2372 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers


Share high-quality web security related articles with you:)


Tag Cloud