HackDig : Dig high-quality web security articles for hacker

Integrating the IoT Into Your Application Security Program

The Internet of Things (IoT) is here, but is your security program ready to handle it? For many reasons, such as network complexity, limited visibility, politics and other challenges that come along with emerging technologies in the enterprise, your organizations is likely underprepared. To get up to speed, a good place to start is your application security
Publish At:2017-08-02 12:30 | Read:326 | Comments:0 | Tags:Application Security Network Application Security Testing Ap

After Big Takedown Efforts, 20 More BankBot Mobile Malware Apps Make It Into Google Play

A flashlight app, fake videos or a fake gaming app? Any one of those could be malicious and harboring a mobile malware app, right there in a trusted official app store. In an ongoing trend, IBM X-Force noted that malicious apps manage to circumvent controls and infiltrate legitimate stores. And this is not about the plethora of adware apps infecting users in
Publish At:2017-07-28 03:30 | Read:319 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Malware Mobile

SMS Scams and Smartphone Malware

Smartphones have become a crucial part of our everyday lives; we shop, bank and network using our phones. But with so much valuable personal data being stored on these devices, they have become a top target for cyber criminals. If they can crack our phones, they can steal our identities, blackmail us for cash, or empty our bank accounts using scams. As a res
Publish At:2017-07-25 22:40 | Read:290 | Comments:0 | Tags:Mobile Security Malware scams smartphones sms

The 21st-Century Real Estate Deal: How the Internet of Things Is Changing Commercial Real Estate

The commercial real estate (CRE) industry is on the verge of a major disruption: the Internet of Things (IoT). Technology is making its way into an industry that historically lacks the innovative spirit, and we’re beginning to see a drastic change in what it means to be a real estate broker. As client needs evolve, brokers must develop new skills to k
Publish At:2017-07-14 17:35 | Read:295 | Comments:0 | Tags:Mobile Security Network Automation Connected Devices Interne

Zero Packet Inspection

Introduction In this blogpost I describe the history of z9, our detection engine. I will show its performance over reference data sets commonly used in the machine learning community. I’ll then describe how we apply it to detect networks attacks without any type of packet inspection. Eventually, we encourage you to participate by helping us gather and
Publish At:2017-07-11 22:35 | Read:386 | Comments:0 | Tags:0-Packet Android iOS Machine Learning Mobile Malware Mobile

The Promise of a Unified App Catalog for the Enterprise

Applications can improve the way we get through the day. There are apps for shopping, getting to your next destination, staying abreast of the latest news, keeping in touch with loved ones — no matter what you need, chances are there’s an app for it. It’s no different for enterprises. Apps have helped revolutionize entire industries and have beco
Publish At:2017-07-11 15:55 | Read:426 | Comments:0 | Tags:Application Security Endpoint Mobile Security Apple Applicat

Mistakes to avoid when choosing an app

Risks of downloading apps The snappy catchphrase “there’s an app for that” is true – there really is a smartphone app for almost every task you can think of. There’s a virtual cow milking simulator, a carpet cost calculator and a tool for counting how many beers you have drunk for instance. But next time you are looking for an app that’s a little unusual, th
Publish At:2017-07-07 12:20 | Read:288 | Comments:0 | Tags:Mobile News Mobile Security Panda Mobile Security tips

Maintaining CIA to Keep Health Care Security Threats at Bay

Imagine that your health care organization just went on bypass due to a cyberattack. For those unfamiliar with the term, bypass is when a health care facility is unable to provide services for one reason or another. When an emergency room parking bay area is literally full of ambulances, for example, the hospital may go on bypass to ensure that any addition
Publish At:2017-06-29 09:20 | Read:355 | Comments:0 | Tags:Health Care Risk Management Data Protection Health Care Data

Execute Your IoT Deployment by the Book

Organizations contemplating Internet of Things (IoT) deployment projects must look at both past and future challenges through the lens of security. Enterprise data security is not a new topic, but for many companies, IoT deployments present new challenges because they extend the perimeter by introducing thousands of additional endpoints, each of which repres
Publish At:2017-06-27 20:30 | Read:371 | Comments:0 | Tags:Endpoint Mobile Security Network Connected Devices Endpoint

Zimperium and Deutsche Telekom Offer Mobile Security to German Bundestag Elections

Here at Zimperium, we spend all day, every day, obsessing about mobile security and how we can provide a secure mobile experience. That’s not just because we are driven. It’s because the threats to mobile devices are both immediate and real. Every time someone uses an iPhone or an Android device to make a call, send or receive a text, check email
Publish At:2017-06-27 05:20 | Read:441 | Comments:0 | Tags:Mobile security Mobile Threat Defense Partners Deutsche Tele

Should We Disconnect to Improve IoT Security?

When I do media spots, interviewers often ask me, “What is the best single thing you can do to prevent cyberattacks?” I jokingly respond, “Unplug and turn off all your devices — it’s a 100 percent security solution!” Ironically, when discussing Internet of Things (IoT) security, some people believe turning all devices off is an
Publish At:2017-06-26 07:40 | Read:400 | Comments:0 | Tags:Mobile Security Network Risk Management Bring-Your-Own-Devic

More Mobile Apps Means More Man-in-the-Middle Attacks

When you travel outside your corporate network with your mobile device, you are much more vulnerable to man-in-the-middle (MitM) attacks. This is how attackers intercept data as it’s being passed from a mobile device to a server. Of course, this is problematic for a number of reasons. CSO Online demonstrated how easy it is to steal all sorts of informa
Publish At:2017-06-21 17:10 | Read:506 | Comments:0 | Tags:Endpoint Mobile Security Application Security Bring-Your-Own

CEOS are the Biggest Risk to the Mobile Security of Companies

The benefits of having always-connected employees are palpable. However, it is a considerable challenge for corporate security managers, who have to make sure that constant access to company data from any location does not pose a risk to the company. In fact, 92% say they are concerned about the security challenges posed by a growing mobile workforce, accord
Publish At:2017-06-20 15:10 | Read:436 | Comments:0 | Tags:Panda Security businesses CEOs Mobile Security

How can I extend the life of my battery?

Short battery life is a known issue for all smartphones There is hardly anything more frustrating than wanting to use your cell phone and not having enough juice in it. Sometimes you can just plug it in the wall and charge it a little bit, but there are also times when you don’t have the luxury to do so. Short battery life is a known issue for all smartphone
Publish At:2017-06-16 00:40 | Read:351 | Comments:0 | Tags:Mobile News Mobile Security Android Panda Mobile Security ti

Securing Your Enterprise Assets While Traveling for Work

Traveling for work is a regular occurrence for many of us. Most of the time, traveling for client meetings, conferences, team meetings and other work-related activities also means taking a laptop or other portable devices traveling too. These devices could easily include your company’s IP, strategic plans, financials or other sensitive enterprise asset
Publish At:2017-06-08 16:05 | Read:478 | Comments:0 | Tags:Data Protection Endpoint Mobile Security Security Intelligen


Share high-quality web security related articles with you:)


Tag Cloud