HackDig : Dig high-quality web security articles for hacker

Our Bring Your Own Malware Challenge is Back!

We are hosting the Bring Your Own Malware Challenge at a series of upcoming events. Bring it to InfoSec in London, Gartner Security Summit in Maryland and of course, Black Hat in July. The rules are simple, you have to plan ahead, but we have a cash prize. That’s right. We’ll be hosting our BYOM aka Bring Your Own Malware Challenge once again, and it will
Publish At:2017-05-25 01:00 | Read:4022 | Comments:0 | Tags:Company News Threats challenge endpoint infosec Isolation Ma

Cybersecurity Virtualization Expert Ian Pratt Explains WannaCry Exploit (Video)

Ian Pratt, co-founder of Bromium and a virtualization expert was interviewed by Sky News. The video clip below shows how the malware arrived and how it deployed. This is the first of what will be many likely exploits in the months to come. WannaCry is likely the first of many global cybersecurity events that will put our collective economies at risk. From
Publish At:2017-05-15 01:25 | Read:3338 | Comments:0 | Tags:Breaking News cybersecurity ian pratt infosec interview micr

Justifying the Value of Conference Attendance to Your Boss

Over the weekend, I became immersed in a discussion on Twitter centered around getting more people involved in InfoSec conferences. Here’s the original post by @hacks4pancakes:Lesley’s initial point led to many great responses relating to the value of attending conferences and the process of communicating that value to the powers that be within your organiza
Publish At:2017-03-15 23:30 | Read:3568 | Comments:0 | Tags:Off Topic Conference Infosec networking

A C(I)SO View on RSA 2017: “China Is Hiring in the US”

Two weeks ago, while visiting the yearly security gathering at the RSA conference in San Francisco’s Moscone center complex (and adjacent hotels – it’s growing like mad), I was walking across the North and South Expo halls to check out some vendors (Several I had appointments with, some by curiosity, and a few that were really new kids on the block.) selling
Publish At:2017-02-28 04:55 | Read:3479 | Comments:0 | Tags:Events Featured Articles CISO Infosec RSA security

Make it public or private…how secure is your profile online?

Part 1 Did you ever ask yourself if you care what personal information you give out online or in exchange for a “free” service?  Do you really want to mix your colleagues with a friends or family on social media? Do you really want to leak some information about your life and interests to strangers? (Yes, strangers because you don’t know your online audience
Publish At:2017-02-20 23:05 | Read:3412 | Comments:0 | Tags:InfoSec

Busy Weekend

News coverage can often be like waiting for a bus. You can go a long time when nothing really happens and then suddenly lots of them arrive together. This weekend was one of those occasions when BH Consulting was in various media outlets. Firstly, my latest article for HelpNet Security Magazine was published. The article focuses on the skills shortage that w
Publish At:2017-02-14 01:05 | Read:3602 | Comments:0 | Tags:InfoSec

It Could Happen to Anyone – A CEO Fraud Primer

There has been a lot of media coverage lately over various organisations falling victim to CEO fraud. Basically a scam whereby criminals using email fool a target within an organisation into redirecting funds into bank accounts under their control. We have worked with some companies who have fallen victim to this and we also wrote about the rise in this type
Publish At:2017-02-10 04:40 | Read:3417 | Comments:0 | Tags:InfoSec

Contract Risk Analyst Role Available

Due to our continued expansion and growth, BH Consulting have been engaged by a blue-chip client to recruit a Risk Assessment Analyst. The Risk Assessment Analyst is a strategically important role within this clients organisation with responsibility for executing the risk management methodology in line with the NIST Security Framework, ISO27001 and PCI Stand
Publish At:2017-02-07 03:00 | Read:2853 | Comments:0 | Tags:InfoSec

Does DoD-Level Security Work in the Real World?

I began my career in Information Security working for the Department of Defense, first for a Naval research facility, then Naval Intelligence, and finally with the National Security Agency. Information security for my first assignment meant locking your classified materials in a safe when you left the office at night and making sure the office door was locke
Publish At:2017-02-02 01:45 | Read:3895 | Comments:0 | Tags:Featured Articles IT Security and Data Protection DoD Infose

Setting up DMARC to Defeat Email Abuse

The CERT EU (the Computer Emergency Response Team for the EU institutions, agencies and bodies) released a very informative paper  on how to configure DMARC (Domain-based Message Authentication, Reporting & Conformance) to reduce the level of email abuse. Properly implemented, DMARC can reduce the amount of spoofed emails which according to the whitepap
Publish At:2017-01-14 07:55 | Read:2401 | Comments:0 | Tags:InfoSec

5 Tips to Get an “A” on Research Papers & Advance Your Infosec Career

John Callahan’s October article “4 Reasons to Get Your Masters in Cyber Security” made me think about how to help students and cyber professionals strengthen a critical soft skill: written communication.Research synthesis and analysis papers are common in academic environments. These critical thinking assignments require students to conduct research on speci
Publish At:2017-01-12 08:25 | Read:3205 | Comments:0 | Tags:Off Topic academic browser communication Infosec Patching se

Divining Infosec: Security Experts’ Predictions for 2017

We saw a lot happen in information security over the course of 2016. Some of these events, like the distributed denial-of-service (DDoS) attacks that struck Dyn and Russia’s hacking of the DNC, made the public care about digital security as never before. Those incidents changed the national discourse on information security. As such, they shifted the s
Publish At:2017-01-04 08:51 | Read:4193 | Comments:0 | Tags:Featured Articles DDoS Infosec IoT risk security

Infosec in Review: Security Professionals Look Back at 2016

2016 was an exciting year in information security. There were mega-breaches, tons of new malware strains, inventive phishing attacks, and laws dealing with digital security and privacy. Each of these instances brought the security community to where we are now: on the cusp of 2017.Even so, everything that happened in 2016 wasn’t equally significant. So
Publish At:2016-12-21 11:00 | Read:5229 | Comments:0 | Tags:Featured Articles Off Topic Infosec IoT malware Mirai ransom

How to build your first digital forensics lab on a budget

Some companies set up a digital forensics lab in order to carry out internal checks for workplace misconduct, to support disciplinary proceedings, to carry out incident analysis and damage assessment, or else to provide digital forensics services for profit to others. Demand for digital forensics is growing: Transparency Market Research has forecast that the
Publish At:2016-12-19 14:25 | Read:3339 | Comments:0 | Tags:InfoSec

Inaugural BSidesPhilly Event a Smashing Success

People say that Philadelphia has an inferiority complex. They say that that we feel overlooked being located between New York and Washington, D.C. Until earlier this month, as far Security BSides was concerned, that was pretty much true. Great BSides groups are easy driving distance from Philadelphia, but we had nothing in our own backyard. Why not us?The ca
Publish At:2016-12-16 01:16 | Read:3997 | Comments:0 | Tags:Featured Articles Security Slice bsides Infosec security


Share high-quality web security related articles with you:)


Tag Cloud