HackDig : Dig high-quality web security articles for hacker

Adaptive Defense 360 Given Stamp of Approval by AV-Comparatives

Defending your devices in our hyperconnected world is no simple task. Your protection should include a wide range of defense mechanisms, a necessary deployment that, until now, has forced IT organizations to purchase and maintain a variety of products from different providers. In December, AV-Comparatives gave their stamp of approval to the three principles
Publish At:2017-01-17 10:30 | Read:2507 | Comments:0 | Tags:Panda Security adaptive defense av-compartives highlighted n

“Eye Pyramid”, the Cyber-Espionage Malware that has Italy Reeling

This Tuesday, the Italian state police dismantled a cyber-espionage ring spearheaded by a brother and sister that sought to exert control over public institutions and administrations, professional studios, employers, and politicians. The network was able to access confidential information by installing a virus on victims’ computers, stealing information sens
Publish At:2017-01-12 01:25 | Read:1987 | Comments:0 | Tags:News Cyber-espionage cyberattack eye pyramid highlighted

How to Bolster Security for Your Online Store This Holiday Season

The gift giving season is just around the corner. With the frenzy of Black Friday and Cyber Monday already behind us, shops that conduct their sales online (and their clients) should be prepared for the most hectic weeks of the year still to come. Unfortunately, this is also the busiest time of year for scammers that try their luck at fishing in frenzied wa
Publish At:2016-12-22 17:00 | Read:3700 | Comments:0 | Tags:Mobile News Tips businesses christmas highlighted online sal

Don’t Let Yahoo Happen To You: How to Protect Your Business from Large-Scale Data Theft

In 2016, the theft of passwords from internet titans is no longer an exception. Just when it seemed like the year was winding down, having left us with the surprising news of what until yesterday was considered the highest magnitude cyberattack in history suffered by Yahoo and reported three months ago, this same company returns to headlines after announcin
Publish At:2016-12-15 18:25 | Read:3757 | Comments:0 | Tags:Internet Security Mobile News businesses highlighted Product

In 2017, less malware and more advanced attacks

The decline in new malware and the increased professionalization of attacks will set the tone in cybersecurity for next year, according to PandaLabs’ Cybersecurity  Predictions for 2017. Ransomware will encompass the majority of attacks, and companies will amass a larger number of increasingly advanced intrusions. As far as cybersecurity goes, we bid farewe
Publish At:2016-12-13 11:05 | Read:2820 | Comments:0 | Tags:Mobile News PandaLabs highlighted Malware news predictions

How to avoid hacking to Critical Infrastructure

The cyber-attacks on the backbone of today’s economies are materialized in those assaults that affect society as a whole. The strategic priorities of national security include infrastructure exposed to the threats that can affect the operation of essential services. PandaLabs, Panda Security’s anti-malware laboratory, has released a whitepaper called “
Publish At:2016-11-30 09:20 | Read:2841 | Comments:0 | Tags:Mobile News Panda Security critical infrastructure cybersecu

A phishing attack is launched every thirty seconds: 6 tips to protect yourself

Phishing continues to blight the Internet and is a thorn in the side of companies around the globe. Not only is it one of the most serious problems facing any company with even a minimal activity on the Web, it is also an ever-increasing threat. So much so, that a recent study has revealed that in the last year alone there have been more than a million attac
Publish At:2016-11-16 13:35 | Read:2941 | Comments:0 | Tags:Malware Mobile News cybersecurity highlighted Panda Security

TrickBot, new spam campaign against companies

On November the 2nd we witnessed a new spam campaign delivering emails each with a Word document attachment targeting UK companies. Each email message had the subject “Companies House – new company complaint” and the Word document attachment was titled “Complaint.doc”. When users open the document, this is what they see: How TickBot works? If the user foll
Publish At:2016-11-08 09:15 | Read:2750 | Comments:0 | Tags:Malware Mobile News companies cybersecurity highlighted Pand

AtomBombing, a new threat to your Windows

A few days ago Tal Liberman, a security researcher from the company enSilo revealed a new code injection technique that affects all Windows versions up to Windows 10. Due to the nature of this technique it is unlikely that it can be patched. In this article I’d like to shed light on this attack, its consequences and what can be done in order to protect ours
Publish At:2016-11-04 13:35 | Read:2635 | Comments:0 | Tags:Malware Mobile News atombombing companies highlighted Panda

Insiders, their costumes are so good you won’t even recognize them.

Knock knock! Trick or treat! Companies and cybercriminals play the same game. You could be opening back doors to cybercriminals this year, without even knowing it. You’ll lose this game if you don’t fight back. Ransomware attacks will capture your documents and the attackers will be expecting a big juicy reward (if you want your files back, that is). This Ha
Publish At:2016-10-28 16:30 | Read:3132 | Comments:0 | Tags:Mobile News News companies halloween highlighted insiders

Cybercrime Reaches New Heights in the Third Quarter

Cybercrime isn’t slowing down anytime soon. This quarter, cybercriminals were increasingly more ingenious, using innovative technologies and new tools to spread their wares. According to the PandaLabs report, 18 million new malware samples were captured in this quarter alone, an average of 200,000 each day. The wave of sophisticated attacks used this quarte
Publish At:2016-10-21 00:50 | Read:3195 | Comments:0 | Tags:Mobile News PandaLabs highlighted Malware news report

They can remotely access and control my computer?

We are always talking about ransomware and the importance of keeping your corporate network protected, and we want to warn our readers about the popular Trojan attacks that are going after small and medium sized businesses. But how do you know when it’s a Trojan? How can you secure yourself against Trojans? 5 Things You Should Know They are maliciou
Publish At:2016-10-13 20:20 | Read:2328 | Comments:0 | Tags:Malware Mobile News highlighted infographic tips trojans

POS and Credit Cards: In the Line of Fire with “PunkeyPOS”

PandaLabs, Panda Security’s anti-malware laboratory, has been working on an in-depth investigation since May related to Point of Sale terminals (POS) in restaurants across the United States. A new malware sample was discovered during this investigation called PunkeyPOS, a malware variant that is able to access credit card data. PandaLabs left this informati
Publish At:2016-06-23 21:05 | Read:2650 | Comments:0 | Tags:Malware Antivirus highlighted Panda Security punkeypos

Beware of Online Invoices! A Newly Discovered Threat Has Already Crossed Borders

Just a few days ago we received an alert from Endesa, a Spanish electricity company, warning us of a new online scam targeting victims through fraudulent emails. The cyber-criminals send out fake invoices to Spanish users, using the Endesa name, and then the attack hits soon after. Unfortunately, the cyber-criminals were successful in their first attack and
Publish At:2016-06-10 04:35 | Read:3231 | Comments:0 | Tags:Malware alert Antivirus highlighted massive fraud Panda Secu

Billion Dollar Sting: A Financial Corporation’s Worst Nightmare

For years cybercriminals have had their focus on money, and most specifically in the financial system. For more than a decade they have been mainly targeting the weakest link in the chain: the final user that uses online banking services. This approach has some benefits for these cybercriminals: poor security in the end user, small money thefts that can go
Publish At:2016-06-02 13:10 | Read:3771 | Comments:0 | Tags:Malware Antivirus cyber attacks highlighted Panda Security

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud