HackDig : Dig high-quality web security articles for hacker

The Living Dead: How to Protect Legacy Systems

The recent widespread attacks of WannaCry and NotPetya both used known vulnerabilities of legacy operating systems, namely SMB v1 protocol. In general, known vulnerabilities are easy to mitigate as long as patches and updates are provided. But in these cases, many organizations seem to have ignored the advice to patch their systems — or maybe not. There ar
Publish At:2017-07-20 21:00 | Read:415 | Comments:0 | Tags:Network Risk Management Legacy Applications legacy systems n

April 911 Outage Affected 3.5 Percent of U.S. Population

In the early hours of April 10, a series of errors led to a massive, multi-state outage in the emergency call management centers (ECMCs) that handle 911 calls in seven geographically dispersed states. The incident originated at an obscure but critical call routing hub in Englewood, Colo., and ended up knocking out the emergency communication infrastructure f
Publish At:2014-10-23 01:15 | Read:1329 | Comments:0 | Tags:Critical Infrastructure Government 9/11 911 call center crit

Building Cyber Security Right From the Start

If you want to make sure visitors to a building are properly checked in at the front door, the best time by far to arrange for this security precaution is at the initial design stage. This is when the front entry can be designed to be secure, practical and inviting, and other entrances can either be eliminated or appropriately secured. Unsurprisingly, the sa
Publish At:2014-08-10 12:03 | Read:2231 | Comments:0 | Tags:CISO Risk Management Chief Information Security Officer (CIS

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud