HackDig : Dig high-quality web security articles for hackers

Are Your IT Infrastructures Up to Date with the Cybersecurity Compliance Laws in 2021?

It’s an unfortunate fact that cybersecurity is rarely the foremost of concerns among small- to medium-sized businesses. However, investing in cybersecurity is becoming even more important as these organizations undergo digital transformation. It may seem like there are more important priorities on which a small business could focus, but putting your company
Publish At:2021-02-22 00:20 | Read:93 | Comments:0 | Tags:Regulatory Compliance infrastructure Law SME security cyber

3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or outside anymore. The modern network is porous; it allows greater numbers and types of devices to connect to it from all over the world.This characteristic might serve organizations’ evolving business needs as they pursue their
Publish At:2020-08-25 01:55 | Read:891 | Comments:0 | Tags:Internet of Things Cloud IIoT infrastructure secure configur

5G security and privacy for smart cities

The 5G telecommunications revolution is imminent. It is the next generation of cellular network, making use of the existing 4G LTE in addition to opening up the millimeter wave band. 5G will be able to welcome more network-connected devices and increase speeds considerably for users. It will serve as the foundation for advanced services, including: 8k strea
Publish At:2019-11-22 18:05 | Read:1624 | Comments:0 | Tags:Publications Cyber espionage DDoS-attacks infrastructure Int

A week in security (November 11 – 17)

Last week on Malwarebytes Labs, we offered statistics and information on a sneaky new Trojan malware for Android, inspected a bevy of current Facebook scams, and explained the importance of securing food and agriculture infrastructure. We also released our latest report on cybercrime tactics and techniques, offering new telemetry about the many cybersecu
Publish At:2019-11-18 16:50 | Read:1820 | Comments:0 | Tags:A week in security CTNT cybercrime tactics & techniques cybe

Connected Medicine and Its Diagnosis

Medical data is slowly but surely migrating from paper mediums to the digital infrastructure of medical institutions. Today, the data is “scattered” across databases, portals, medical equipment, etc. In some cases, the security of the network infrastructure of such organizations is neglected, and resources that process medical information are acc
Publish At:2017-09-13 08:00 | Read:4564 | Comments:0 | Tags:Featured Publications infrastructure Internet of Things Secu

Big Changes Around the Corner for the IoT

The Internet of Things (IoT) is a swamp that just doesn’t want to be drained. While there hasn’t been a huge alligator of a distributed denial-of-service (DDoS) attack in the last few months, it’s only a matter of time before a new one strikes. There are simply too many connected devices, many of which lack the built-in security to resist b
Publish At:2017-04-21 16:20 | Read:4267 | Comments:0 | Tags:Endpoint Network Connected Devices Infrastructure Infrastruc

The Mistakes of Smart Medicine

As numerous studies have shown, smart houses, smart cars, and smart cities are undeniably beneficial to people in everyday life, but quite often can become a threat to their safety. It is not only a matter of personal data leakage. Just imagine that, for example, a smart refrigerator, affected by a third party at one point or another, would begin identifying
Publish At:2017-03-30 14:35 | Read:5248 | Comments:0 | Tags:Analysis Featured Publications infrastructure Internet of Th

Lesson Learned From Stuxnet

Security researchers discovered Stuxnet in 2010, and it has since become one of the most well-known malware campaigns in history. The cybercriminals behind the attack developed the infamous worm to damage programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems using four zero-day vulnerabilities in Microsoft Windows
Publish At:2017-03-10 12:10 | Read:4142 | Comments:0 | Tags:Energy and Utility Infrastructure Protection Energy Industry

How to Ensure the Success of a Hot Desking Strategy

The concept of hot desking — the practice of working in a shared office with unassigned desks — has been around for at least a decade. While much has been written about it from a worker’s point of view, employers and IT administrators have had a relatively small voice in the discussion around the latest office craze. Before you even consider whether th
Publish At:2017-01-13 22:00 | Read:5745 | Comments:0 | Tags:Infrastructure Protection Mobile Security Bring-Your-Own-Dev

Paas and continuos integration

Today I want to repost a great article first posted on sysadvent blog. I think it’s a great post that show how to integrate different software to achieve a modern continuos integration. Original article by: Written by: Paul Czarkowski (@pczarkowski) Edited by: Dan Phrawzty (@phrawzty) Docker and the ecosystem around it have done some great things for d
Publish At:2016-11-19 20:55 | Read:6729 | Comments:0 | Tags:Articles Guides alias continuos integration ghost infrastruc

ICS vulnerabilities are still rampant

To put it in somewhat technical terms, the nation’s industrial control systems (ICS) – part of its critical infrastructure – are not only vulnerable to compromise, they are likely compromised right now.Or, in Paul Dant’s much more blunt, and less technical terms, “your sh-- is f--ked.”Dant, chief strategist and managing principal at Independent Security
Publish At:2016-09-24 03:05 | Read:4295 | Comments:0 | Tags:Security Internet of Things Infrastructure Cybersecurity

Bank of England wants next payment system to be blockchain-ready

The Bank of England wants to open its interbank settlement service to blockchain technologies as part of a major revamp of the system.The bank is not suggesting that U.K. banks should begin processing bitcoin payments as a matter of routine. However, it does want the replacement for its ageing real-time gross settlement (RTGS) system to be ready for what
Publish At:2016-09-16 12:15 | Read:3150 | Comments:0 | Tags:Financial Services IT Infrastructure Security

Citrix & LogMeIn complete complicated, tax-free sort-of merger

LogMeIn, the makers of the popular remote desktop software as well as IT security and conferencing offerings, will become part of a Citrix subsidiary in the wake of a complicated, $1.8 billion transaction announced Tuesday by the two companies.The transaction is what’s called a Reverse Morris Trust, which apparently allows the untaxed transfer of
Publish At:2016-07-28 06:00 | Read:4496 | Comments:0 | Tags:Infrastructure Security Careers/Staffing Internet of Things

How to trick traffic sensors

A detailed presentation of this research was delivered at RSA US 2016, and is available at https://www.rsaconference.com/writable/presentations/file_upload/tech-t09-smart-megalopolises.-how-safe-and-reliable-is-your-data.pdf In the past two years traffic sensors have mushroomed in Russian cities. Drivers using speed camera detectors were the first to spot th
Publish At:2016-04-18 10:05 | Read:4411 | Comments:0 | Tags:Blog Featured Research infrastructure Internet of Things Sma

VMware, Cisco SDNs bring home the bacon

In the scramble for SDN supremacy, Cisco and VMware usually bark about users who opt for one of their solutions over the other.In all the noise, it’s rare to hear from one that plans to implement both.But that’s what SugarCreek, a $650 million, privately-held food processing and packing company based in Washington Court House, OH, is doing in its softwar
Publish At:2016-01-28 11:45 | Read:4995 | Comments:0 | Tags:Data Center Cloud Computing Software-Defined Networking Infr


Tag Cloud