HackDig : Dig high-quality web security articles for hackers

What is Hacktivism? Campaigns That Shaped the Movement

From protests and sit-ins to doxxing and distributed denial-of-service attacks, a new kind of activism rose in the ranks. In 1996, cyber-activism gained a reputation and was given a new name: hacktivism. Consisting of breaking into a computer system for political, social, religious, or anarchistic reasons, hackers began to wage a war on information. Proven t
Publish At:2020-06-23 14:16 | Read:552 | Comments:0 | Tags:Technology cyberattacks Hackers hacking infographic

30 years of cyberattacks: from Barrotes to WannaCry

Cyberattacks are continually evolving. With the Internet now an everyday tool in our lives, they have become something of a constant, and have increased both in frequency and sophistication. Because of this, they have a huge global impact on economies, national security, elections, data theft, and personal and company privacy. Cyberattacks have become an ext
Publish At:2020-05-03 10:16 | Read:649 | Comments:0 | Tags:Panda Security b2b cyberattacks infographic

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success rate. This is because c
Publish At:2017-10-23 23:40 | Read:4919 | Comments:0 | Tags:Company News CISO defense dilemma end users hackers infograp

Turning Off Cybersecurity to Increase Productivity Shouldn’t Be How the Problem Gets Solved

It seems security teams are under a lot of pressure from the organization when it comes to the balance between productivity and staying secure. Our infographic below explains how this plays out: with some saying they turn off security and others modifying it. Cybersecurity shouldn’t be this hard and it shouldn’t impact end user behavior. Users s
Publish At:2017-07-24 23:15 | Read:4032 | Comments:0 | Tags:Company News 2017 click cybersecurity infographic Infosecuri

An Anatomy of the WannaCry Cyberattack

 On Friday, May 12, a ransomware known as WannaCry spread to every corner of the globe. As of now, there are still many questions left unanswered, but the how of the attack is now well known by cybersecurity experts. For those who want to know more about how WannaCry developed, we’ve put together an infographic detailing the various stages of the attack, or
Publish At:2017-05-16 19:15 | Read:4760 | Comments:0 | Tags:News infographic wannacry wannasaveu

Security Professionals Admit to Paying Ransom and Hiding Breaches (Infographic)

We did a survey at RSAC in February that kind of blew our minds; so much so we surveyed more people to check our work! Security professionals admit to paying ransom (from ransomware) and not telling anyone what they’d done. When we went more broadly – U.S. and U.K. security pros – the numbers didn’t get better (they got worse). Have
Publish At:2017-05-13 12:35 | Read:5389 | Comments:0 | Tags:Company News Threats breaches infographic Malware ransom Ran

They can remotely access and control my computer?

We are always talking about ransomware and the importance of keeping your corporate network protected, and we want to warn our readers about the popular Trojan attacks that are going after small and medium sized businesses. But how do you know when it’s a Trojan? How can you secure yourself against Trojans? 5 Things You Should Know They are maliciou
Publish At:2016-10-13 20:20 | Read:3902 | Comments:0 | Tags:Malware Mobile News highlighted infographic tips trojans

Love the City You Live In? So do Cybercriminals!

Myth: There is no link between your real-life location and your digital one. The truth is that the two are very much connected. Perhaps more importantly, then, is what this means when it comes to your personal security. If the state or city in which you live is a hotbed for cybercriminal activity, your chances of being infected online increase significantly.
Publish At:2016-03-11 06:35 | Read:4335 | Comments:0 | Tags:Company Blog Cybercriminals cybersecurity hackers Infographi

How Kids’ Screen Time Interferes with Daily Activities [Infographic]

Mobile devices can be used almost anywhere and everywhere. And with the Internet more accessible than ever, kids are now bombarded with ways in which to avoid the real world and sink into the online realm — a challenge for parents that is multiplied exponentially as mobile devices are always-connected.In many cases, as many parents are well aware, kids' scre
Publish At:2015-10-21 19:00 | Read:6168 | Comments:0 | Tags:Intego Infographic Mobile Devices Screen Time

Attacking Automobiles: Inside a Connected Car’s Points of Vulnerability

Hacking cars has made big headlines in recent months. Back in July of this year, security researchers Charlie Miller and Chris Valasek won the attention of the information security community and beyond when they successfully hacked a Jeep Cherokee’s computer via its Uconnect infotainment system.The duo was able to rewrite the automobile’s firmwar
Publish At:2015-10-20 14:30 | Read:4830 | Comments:0 | Tags:Featured Articles Vulnerability Management Arxan Charles Mil

How to Create a Culture of Cybersecurity at Work [Infographic]

All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for every business. That's why week 2 of October's National Cyber Security Awareness Month (NCSAM) focuses on providing resources that help businesses establish a culture of cybersecurity.If you run a small busine
Publish At:2015-10-09 11:50 | Read:4912 | Comments:0 | Tags:How To Security & Privacy cybersecurity Infographic national

How Much Is Your Privacy Worth? [Infographic]

How much do we care about our privacy? This question is both simpler and more complicated than it appears. While the debate over data mining and privacy is not new, in recent years, Americans have become more concerned about what information is being extracted from them without consent and how it is used.A 2015 Pew survey explored this issue in the wider con
Publish At:2015-08-26 06:30 | Read:4654 | Comments:0 | Tags:Security & Privacy data brokers data mining government surve

The 5 Most Common Attack Patterns of 2014

Tripwire is pleased to announce the release of its newest infographic, “Where Are Your Cyberattacks Coming From?” Created in response to the release of Verizon’s 2015 Data Breach Investigations Report (DBIR 2015) back in April, the infographic explains the five most common attack patterns behind today’s data breaches. In this article, I will review each of t
Publish At:2015-06-25 04:50 | Read:4724 | Comments:0 | Tags:Cyber Security Featured Articles 2015 Data Breach Investigat

Are You Keeping Your Tax Information Safe? – Infographic

April 15 is fast approaching, and many of you have yet to file your taxes. Each year more and more people choose to e-file tax returns, since it's typically fast, convenient, and fairly straightforward. But after you send your information off to the mean ol' IRS, don't forget that you have an unguarded, vulnerable, and very important file containing sensitiv
Publish At:2015-04-08 17:10 | Read:3809 | Comments:0 | Tags:How To Infographic tax season

Infographic: The Mall of American Data Breaches

2014 was a record year for data breaches, with big name companies like Home Depot, Staples, Michaels and Neiman Marcus all disclosing breaches that affected millions of consumers. Heading into the 2014 holiday shopping season, some security insiders are warning that another big data breach disclosure is only a matter of time. To help illustrate the data brea
Publish At:2014-11-25 12:15 | Read:4128 | Comments:0 | Tags:ThreatTrack Security Labs data breach Infographic