HackDig : Dig high-quality web security articles

Is quantum teleportation the future of secure communications?

“Beam me up Scotty” will always remain my first association with teleportation. And as it stands now, we are still a long way from teleporting matter, but the teleportation of information has recently made a huge step forward. Researchers in Delft say they have succeeded in teleporting quantum information across a rudimentary network. This teleportation t
Publish At:2022-05-31 09:01 | Read:486745 | Comments:0 | Tags:Reports entangled information no-cloning theorem quantum com

Parts of the Dark Web “awash” with school children’s personal data

NBC News has collected and analyzed a trove of children’s personal information it discovered on the Dark Web. Even though this information may not be as useful to cybercriminals as credit card details or login credentials, the information is still out there, where we don’t want it. So what is it, and how did it get there? Ransomware Modern ran
Publish At:2021-09-14 19:35 | Read:376177 | Comments:0 | Tags:Awareness credit monitoring Dark Web identity theft informat

The Six Commandments of the GDPR

Otherwise known as the measuring stick by which your GDPR compliance will be assessed, the six core principles of the GDPR are the basic foundations upon which the regulation was constructed.Unquestionable and pure in nature, they are rarely acknowledged for one simple reason: five of the six have no real application in helping you in peddling products and s
Publish At:2017-03-30 14:10 | Read:398136 | Comments:0 | Tags:Featured Articles IT Security and Data Protection GDPR infor

The Next Wave for Cybersecurity Awareness

The annual RSA Conference is a lot of things to a lot of people (43,000 this year!). For me, it’s become an annual opportunity to step out of the stream and to look back at what has happened in the last year and peer forward at what’s to come.This year, I think we have reached an inflection point around the way we as a profession treat the “human element,” a
Publish At:2017-02-27 10:30 | Read:675746 | Comments:0 | Tags:Security Awareness awareness information security

The Cost of Stolen Information Available on the Dark Web

Large hacks and cyber-attacks aimed at exploiting information, affecting everyone from major company databases to politician’s email accounts, have now become a common occurrence in our ever-connected world. This hacked information – and the act of accessing it – has rapidly become a sought-after product and service on dark web marketplaces. Coupled with the
Publish At:2017-02-22 01:15 | Read:418334 | Comments:0 | Tags:Featured Articles IT Security and Data Protection breach Dar

Security & the ‘Weaponization’ of Misinformation

New media, it would appear, now outpaces the old. More data is consumed and processed than at any time before in human history. But as we hasten into a world where the immediate is often favoured over the verified, the attention-grabbing over the considered, and the assumed over the researched in terms of how we both receive and disseminate information, we o
Publish At:2017-02-08 05:10 | Read:677468 | Comments:0 | Tags:Featured Articles Security Awareness AI information security

The Health of Healthcare’s Cyber Security

The current diagnosis for healthcare cyber security is frightening.Here’s our current assessment:One in three healthcare records were compromised in 2015 (IBM 2016).Healthcare is the number one industry when it comes to its records being breached (IBM 2016).Ransomware is on the rise, with 88 percent of attacks occurring in healthcare (Solutionary 2016)
Publish At:2016-10-26 16:10 | Read:385708 | Comments:0 | Tags:Cyber Security Featured Articles Healthcare HIPAA informatio

The Benefits of Sharing Information for IT and Security

Confidentiality, Integrity and Availability – those are the three pillars of the CIA triad model for information security.Here’s something you might not have known: in reverse order, those same pillars apply to IT Operations. Think about it. In a world of agility and enablement, the availability, integrity and confidentiality of the systems and process
Publish At:2016-09-13 16:10 | Read:385076 | Comments:0 | Tags:IT Security and Data Protection Availability CIA Confidentia

Hutton Hotel Warns of Payment Card Breach That Lasted Over 3 Years

Hutton Hotel became the latest hospitality company to warn customers of a data breach that may have compromised their payment card details.The Nashville, Tenn.-based upscale hotel announced the security incident on Friday, stating it was notified of the potential breach by its payment processor.Subsequently, the company said it began an investigation, engagi
Publish At:2016-09-08 08:25 | Read:475467 | Comments:0 | Tags:Latest Security News breach cybersecurity Hutton Hotel infor

Collaboration Is Key to Information Security

The challenges facing security professionals certainly aren’t getting any easier – nor are they likely to do so anytime soon. Not only are the skills and knowledge that we need to operate evolving at an ever-relentless pace but also rapidly diversifying far beyond the familiar technical and governance areas we have been used to.When it seems that even the qu
Publish At:2016-08-30 05:05 | Read:387152 | Comments:0 | Tags:Off Topic collaboration FUD information security

Online Antisocial Media

When we look at online social media, it has been adopted in one flavour or another by nearly all of us. The way we project our persona online has slowly replaced the media of yesteryear. Expression is nothing new; throughout history, people have displayed their wealth, status, literary prowess and wit in the hope of being desired, feared, pondered and admire
Publish At:2016-08-16 12:00 | Read:435692 | Comments:0 | Tags:Featured Articles Security Awareness activity information so

Yes, leaking data can cost you money!

We have repeatedly countered the arguments that people don’t have anything to hide, and can comfortable ignore the privacy threats on the Internet. That’s a very unwise attitude and here’s some more examples why. We have also talked a lot about on-line scams and how to avoid them. A key challenge for any scammer is to be trustworthy in the eyes of the victim
Publish At:2015-02-10 18:05 | Read:309495 | Comments:0 | Tags:email Privacy Security crime criminal data info information

Your digital memories – will they vanish or persist?

If you like sailing and tall ships, I can recommend this podcast about Pam Bitterman’s book Sailing to the far horizon. It’s a great story about the last years of the community-operated ship Sofia, covering both a lot of happy sailing and the ship’s sad end in the early eighties. But this is not about hippies on a ship, it’s about how we record and remember
Publish At:2014-10-13 19:50 | Read:305008 | Comments:0 | Tags:Backup Cloud Storage email Passwords Security Social media y

Asseco SEE iBank FX Client

The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘F’ flag (full) for the ‘Everyone’ and ‘Users’ group, for the ‘RichClient.exe̵
Publish At:2014-08-13 01:55 | Read:295255 | Comments:0 | Tags:Internal asseco binary client default escalation everyone fx


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud