HackDig : Dig high-quality web security articles for hacker

Hackers use hackers spreading tainted hacking tools in long-running campaign

Who is hacking the hackers? Experts from Cybereason a mysterious hackers group is targeting other hackers by spreading tainted hacking tools. Experts from security firm Cybereason warn of a mysterious group of hackers that are distributing trojanized hacking tools on an almost daily basis for the past years. These hacking tools are used by fellow hack
Publish At:2020-03-10 12:40 | Read:218 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Hackers hacking tools info

IOTA cryptocurrency shuts down entire network after a coordinated attack on its Trinity wallet

IOTA Foundation behind the IOTA cryptocurrency was forced to shut down its entire network following a cyber attack that resulted in the theft of funds. Hackers have exploited a vulnerability in the official IOTA wallet to steal funds from the users. In response to the incident, the IOTA Foundation, the nonprofit organization behind the IOTA cryptocurrenc
Publish At:2020-02-16 08:00 | Read:403 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking crypocurrency C

Hackers backed by foreign states attacked 12,000 Google users

Government-supported hackers tried to steal 12,000 Google credentials in 2019 Google’s Threat Analysis Group (TAG) revealed in a report that they distributed more than 12,000 warnings to users in nearly 150 countries that include the United States of America. The recipients were notified that they have been subject of state-sponsored phishing attempts.
Publish At:2019-12-17 09:15 | Read:678 | Comments:0 | Tags:Mobile News Security Cybercrime Google Hackers

Corporate security prediction 2020

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Cyberthreats to financial institutions 2020: Overview and predictions Moving to the cloud The popularity of cloud services is growing, and threat actors are here to exploit the trend. We
Publish At:2019-12-03 06:05 | Read:663 | Comments:0 | Tags:Kaspersky Security Bulletin Cloud Computing Cyber espionage

15 Easy, Effective Ways to Start Winning Back Your Online Privacy

Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a few minutes. I certainly don’t need any more stuff. However, if I could name one gift that would make me absolutely giddy, it would be getting a chunk of my privacy back. Like most people, the internet knows way too much about me — my age, address, phone
Publish At:2019-10-12 11:20 | Read:1038 | Comments:0 | Tags:Family Safety ad blockers children's privacy cloud security

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public. So forget hacking, cybercriminals can just take a str
Publish At:2019-09-24 23:20 | Read:4933 | Comments:0 | Tags:Hacking cam camera devices hackers hacking hub Internet of T

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success rate. This is because c
Publish At:2017-10-23 23:40 | Read:4148 | Comments:0 | Tags:Company News CISO defense dilemma end users hackers infograp

Bionic employees and biohacking

Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work. But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Publish At:2017-09-26 20:45 | Read:3496 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

BlueBorne Bluetooth hack could affect millions of smartphones

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time. But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use
Publish At:2017-09-15 08:00 | Read:4221 | Comments:0 | Tags:Mobile News Mobile Security Android Hackers Malware

Why is Online Voting Not a Good Idea?

Online voting could introduce great risk into the election system by threatening voters It’s the 21st century, and we are living in the future as technology is advancing at a rapid speed. It has never been easier to shop online and to do online banking. It is possible money will even cease to exist as blockchain digital currencies such as Bitcoin and Monero
Publish At:2017-09-12 06:15 | Read:3833 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Are All Hackers Bad? 7 Types of Hackers

Top Seven Types of Hackers You hear about leaks and hacks on a daily basis, but most of the times the identity of the people involved in these events remain hidden from the society. Every time there is a cyber-incident, the media releases a lot of information about the damages, but you rarely get much about the hackers themselves. Sometimes names of a myster
Publish At:2017-08-30 12:35 | Read:3835 | Comments:0 | Tags:Mobile News News Security Hackers Malware tips

PlayStation Network Hacked. Again.

When mysterious tweets appeared on the official Sony PlayStation Twitter feed on Monday morning, it quickly became clear that the account had been hacked. Indeed, the hackers made little effort to hide their activities, proudly announcing that the breach had been carried out by the OurMine Security Group. Photo credit: Twitter Initially there were a few twee
Publish At:2017-08-23 14:50 | Read:3742 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

US military is working on the creation of separate unified cyber warfare command

President Donald Trump ordered the US Military to create a separate cyber warfare command tasked with cyber warfare operations. President Donald Trump wants to improve cyber capabilities of the US Military, he ordered it to create a separate cyber warfare command tasked with cyber warfare operations. President is thinking of a separate command specialized on
Publish At:2017-08-19 11:40 | Read:3598 | Comments:0 | Tags:Breaking News Cyber warfare Admiral Mike Rogers Cyber attack

Hackers target energy and utility firms

Why cyber warfare is becoming so important In the early stages of any war, the first action is to try and disrupt the infrastructure of an enemy. In recent years, this means risking people’s lives to bomb key infrastructure, like power plants, bridges and fuel depots. With key utilities crippled, society quickly breaks down, making it very hard for the count
Publish At:2017-08-18 05:50 | Read:3374 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Former Bupa employee offered 1 million customer records for sale on dark web

Former Employee of the Healthcare giant Bupa offered for sale records of 1 Million clients on Dark Web. A former employee of healthcare giant Bupa was selling between 500,000 and 1 million medical records on the dark web. The former employee whose identity remains undisclosed had sold several batches of hundreds of thousands of medical records managed by Bup
Publish At:2017-08-03 08:00 | Read:4053 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Data Breach Deep Web

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud