HackDig : Dig high-quality web security articles for hacker

Should We Disconnect to Improve IoT Security?

When I do media spots, interviewers often ask me, “What is the best single thing you can do to prevent cyberattacks?” I jokingly respond, “Unplug and turn off all your devices — it’s a 100 percent security solution!” Ironically, when discussing Internet of Things (IoT) security, some people believe turning all devices off is an
Publish At:2017-06-26 07:40 | Read:106 | Comments:0 | Tags:Mobile Security Network Risk Management Bring-Your-Own-Devic

More Mobile Apps Means More Man-in-the-Middle Attacks

When you travel outside your corporate network with your mobile device, you are much more vulnerable to man-in-the-middle (MitM) attacks. This is how attackers intercept data as it’s being passed from a mobile device to a server. Of course, this is problematic for a number of reasons. CSO Online demonstrated how easy it is to steal all sorts of informa
Publish At:2017-06-21 17:10 | Read:221 | Comments:0 | Tags:Endpoint Mobile Security Application Security Bring-Your-Own

CEOS are the Biggest Risk to the Mobile Security of Companies

The benefits of having always-connected employees are palpable. However, it is a considerable challenge for corporate security managers, who have to make sure that constant access to company data from any location does not pose a risk to the company. In fact, 92% say they are concerned about the security challenges posed by a growing mobile workforce, accord
Publish At:2017-06-20 15:10 | Read:175 | Comments:0 | Tags:Panda Security businesses CEOs Mobile Security

How can I extend the life of my battery?

Short battery life is a known issue for all smartphones There is hardly anything more frustrating than wanting to use your cell phone and not having enough juice in it. Sometimes you can just plug it in the wall and charge it a little bit, but there are also times when you don’t have the luxury to do so. Short battery life is a known issue for all smartphone
Publish At:2017-06-16 00:40 | Read:159 | Comments:0 | Tags:Mobile News Mobile Security Android Panda Mobile Security ti

Securing Your Enterprise Assets While Traveling for Work

Traveling for work is a regular occurrence for many of us. Most of the time, traveling for client meetings, conferences, team meetings and other work-related activities also means taking a laptop or other portable devices traveling too. These devices could easily include your company’s IP, strategic plans, financials or other sensitive enterprise asset
Publish At:2017-06-08 16:05 | Read:287 | Comments:0 | Tags:Data Protection Endpoint Mobile Security Security Intelligen

IBM Picks Up Six: A Leader in 2017 Gartner Magic Quadrant for Enterprise Mobility Management

For the sixth consecutive year, IBM has been recognized as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites. In 2017, Gartner continues to define enterprise mobility management (EMM) suites across five core technologies, all of which are available through the following IBM MaaS360 with Watson cognitive unified endpoint managem
Publish At:2017-06-08 16:05 | Read:304 | Comments:0 | Tags:Mobile Security Enterprise Mobility Management (EMM) Gartner

Four Key Considerations for Managing Your IoT Population

As your Internet of Things (IoT) device population grows, managing it becomes increasingly difficult. More devices means more potentially vulnerable endpoints, more identities to verify and more software to keep up to date. Four Keys to Effective IoT Population Management To effectively manage your IoT population, it’s important to know your users, d
Publish At:2017-06-05 14:15 | Read:266 | Comments:0 | Tags:Endpoint Mobile Security Network Authentication Chief Inform

Is it dangerous to share your location on the internet?

Look at the apps installed on your smartphone and you’ll see that many of them offer location sharing functions. Location sharing is incredibly useful – when used correctly. Here are a few things you should be aware of “Check-ins” and strangers Apps like Foursquare and Swarm encourage users to “check-in” when visiting restaurants, bars and other places of in
Publish At:2017-06-02 16:40 | Read:332 | Comments:0 | Tags:Mobile Security Social Media cybersecurity social media tips

WannaCry II: The Sequel No One Wants to See

In filmmaking, sequels tend to raise the stakes with tougher antagonists, increased danger and more nightmarish scenarios with which the heroes have to contend. Audiences love to watch familiar characters, who barely survived the challenges of the first film, pushed to the absolute limit to overcome even higher odds, with much more on the line if they fail.
Publish At:2017-05-31 16:50 | Read:300 | Comments:0 | Tags:Fraud Protection Mobile Security

NDAY-2017-0103: Arbitrary kernel write in sys_oabi_epoll_wait

By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) Nicolas Trippar Follow Nicolas Trippar (@ntrippar) zNID: NDAY-2017-0103 CVE: CVE-2016-3857 Type: Elevation of Privileges Platform: Android < 6.0 Device type: Huawei MT7-UL00, Nexus 7 Zimperium protection: Detected the exploit without an update. Zimperium partners and customers do not need to take any
Publish At:2017-05-25 16:50 | Read:357 | Comments:0 | Tags:Android Mobile security Mobile Threat Defense N-Day Threat R

NDAY-2017-0101: iCloud Information Leak

By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) Nicolas Trippar Follow Nicolas Trippar (@ntrippar) zNID: NDAY-2017-0101 CVE: Unknown Type: Information Disclosure Platform: iOS < 10.3 Device type: iPhone, iPod iOS bulletin: https://support.apple.com/en-us/HT207617 Public release date: 25th of May, 2017 Credit: Anonymous Download Exploit (passwor
Publish At:2017-05-25 16:50 | Read:364 | Comments:0 | Tags:iOS Mobile security Mobile Threat Defense N-Day Threat Resea

Don’t Leave Home Without These Five Travel Security Tips

It’s vacation time for many of us, and that means it’s Christmas for criminals. In their eagerness to experience all the wonders of leisure destinations, travelers are prone to overlooking risks to their physical and digital security. Crooks know this, which is why they target people carrying cameras, sporting backpacks or exhibiting other signs
Publish At:2017-05-25 13:35 | Read:287 | Comments:0 | Tags:Data Protection Identity & Access Mobile Security Authentica

Is online banking safe? How to use online banking apps

Online banking has exploded in popularity, mainly down to the fact that it makes managing our finances so easy. Every high street bank now has online facilities for checking balances, setting up direct debits and printing statements from their website for instance. And most also have a smartphone app so you can check that information on the move. But this in
Publish At:2017-05-24 11:35 | Read:310 | Comments:0 | Tags:Mobile News Mobile Security Android cybersecurity

¿Son seguras las apps de banca online?

Pautas de seguridad para tus operaciones de banca online Las ventajas a nivel de comodidad e inmediatez que ofrecen las aplicaciones de banca en online han hecho que en los últimos años cada vez más usuarios empiecen a gestionar sus finanzas también desde su móvil. Poder realizar todas las operaciones y consultar el saldo desde cualquier lugar han convencido
Publish At:2017-05-22 22:45 | Read:446 | Comments:0 | Tags:Mobile News Mobile Security Android cybersecurity

MaaS360: A GDPR-Ready Unified Endpoint Management Solution

From a compliance perspective, the General Data Protection Regulation (GDPR) is a key focus area in global enterprises. This regulation was first introduced in January 2012 and will go live on May 25, 2018. Refined by input from the European Council, European Parliament and European Commission, the GDPR, unlike a directive, will be directly applicable in all
Publish At:2017-05-19 10:05 | Read:418 | Comments:0 | Tags:Data Protection Mobile Security Compliance Endpoint Manageme


Share high-quality web security related articles with you:)


Tag Cloud