HackDig : Dig high-quality web security articles for hacker

How to protect against stalkerware, a murky but dangerous mobile threat

Last week, we pledged that—in honor of National Cybersecurity Awareness and Domestic Violence Awareness months—we would continue the fight against the online scourge known as stalkerware, or applications used to track and spy on victims without their knowing consent. We told readers that, despite working to protect against stalkerware programs for more th
Publish At:2019-10-09 11:20 | Read:525 | Comments:0 | Tags:Stalkerware domestic abuse domestic violence monitoring moni

Virtualization-Based Security…Bromium 4.0 Takes Isolation Mainstream

We’ve been working hard to get ready for the long anticipated launch of Bromium Secure Platform 4.0. Many of our customers, 35 to be exact, have already had the opportunity to test the release candidates and give feedback. Register now for the upcoming webinar on April 27 to learn more about what’s in the new release of Bromium Secure Platform. Virtualizat
Publish At:2017-04-16 13:05 | Read:2965 | Comments:0 | Tags:Company News 4.0 attacks blacklisting blocking Bromium Secur

Iran orders media companies to store data in the country

Iran orders foreign social media and instant messaging companies to use servers in the country to store all data related to the Iranian citizens. The Iranian Government spends a significant effort for the Internet monitoring and control, its activities often lead to a concrete censorship. Last year the Government of Teheran has blocked Telegram and many othe
Publish At:2016-06-01 09:20 | Read:3571 | Comments:0 | Tags:Breaking News Laws and regulations Security Social Networks

Audio fingerprinting being used to track Internet users

A study of online trackers carried out by researchers at Princeton University allowed the identification of the Audio fingerprinting tracking technique. Privacy is probably one of the most debated arguments when dealing with the Internet, we discussed several times the way to protect anonymity online and which are the attacks law enforcement and intelligen
Publish At:2016-05-21 17:50 | Read:3300 | Comments:0 | Tags:Breaking News Digital ID Audio fingerprinting monitoring Ope

FISA Court approved each and every request made by the government in 2015

According to a Justice Department memo, the FISA ACT Court approved each and every request made by the government in 2015. According to a Justice Department memo, the United States Foreign Intelligence Surveillance Act (FISA) Court approved each and every request made by the government in 2015. All of the 1,457 requests made last year by the NSA and FBI were
Publish At:2016-05-02 17:35 | Read:3919 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations DoJ Facebook F

The FBI requests $38 Million to counter the threat of Going Dark

The FBI requests $38 Million to counter the threat of Going Dark, in particular asking more economic resources to break encryption when needed. The FBI Director James Comey has highlighted in different occasions the difficulties faced by law enforcement when dealing with encryption during their investigations. Now, the FBI is making its request for budget fo
Publish At:2016-02-12 20:10 | Read:2696 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Intelligence Laws and regu

Italian intelligence plans to monitor also communications through the Playstation

Italian intelligence is planning to invest in solutions that could allow its counter-terrorism agents to monitor Sony’s PlayStation Network. The Italian intelligence is planning to invest in solutions that could allow the agents of the Italian counter-terrorism to monitor Sony’s PlayStation Network in order to prev
Publish At:2015-12-01 00:00 | Read:2986 | Comments:0 | Tags:Breaking News Hacking Intelligence Laws and regulations Secu

Karma Police, how GCHQ tried to track every visible user on Internet

A new collection of GCHQ’s documents published by The Intercept reveals how the British Agency tried to track Web visits of “every visible user on Internet” A new revelation made by The Intercept confirms that the UK Government Communications Headquarters (GCHQ) has conducted  a massive online surveillance starting from
Publish At:2015-09-26 10:40 | Read:3063 | Comments:0 | Tags:Breaking News Hacking Intelligence British Intelligence GCHQ

AppSensor Guide v2.0.2

I have published an updated version of the OWASP AppSensor Guide, the guide to application-specific real time attack detection and response.The v2.0.2 AppSensor Guide is available free of charge digitally in DOC and PDF formats, and in print at cost from Lulu.This is a minor update that includes:Reference the extensive work on the reference code implementati
Publish At:2015-07-28 16:35 | Read:3307 | Comments:0 | Tags:testing development design threats technical specification m

AppSensor Code Version 2.1 and Beyond

Last Tuesday John Melton completed and announced the release of the AppSensor version 2.1.0 reference implementation.OWASP AppSensor project defines a conceptual framework and methodology that offers prescriptive guidance to implement application intrusion detection and automated response. The reference implementation allows developers to use these powerful
Publish At:2015-06-15 13:30 | Read:3228 | Comments:0 | Tags:development design threats technical specification monitorin

Someone in the BND was helping the NSA, it’s scandal!

According new revelations published by the Der Spiegel the German intelligence agency BND helped NSA in monitoring European politicians. We discussed several times of the aggressive cyber espionage campaigns run by the US intelligence and its allies of Five Eyes (Canada, UK, New Zeland, Australia and, of course, the US). The
Publish At:2015-04-25 23:20 | Read:3850 | Comments:0 | Tags:Breaking News Intelligence BND cyber espionage Five Eyes Ger

AppSensor CISO Briefing

Following the release of the Introduction for Developers in February, the OWASP AppSensor team has now created and published a new document aimed at Chief Information Security Officers (CISOs) and others with similar responsibilities.The CISO Briefing is a high-level overview, with pointers to the more detailed resources for specifiers, architects, developer
Publish At:2015-04-24 20:20 | Read:4288 | Comments:0 | Tags:incidents logging operation automation specification technic

PCI DSS v3.1 for Ecommerce Payments

Lots happening this week. The Payment Card Industry Security Standard Council (PCI SSC) has announced the release of an update to the PCI Data Security Standard (PCI DSS).PCI DSS v3.1 (15 April 2015), includes several changes to reflect changing threats and recently discovered vulnerabilities, but also including some clarifications and additional guidance.Th
Publish At:2015-04-16 15:55 | Read:2541 | Comments:0 | Tags:technical SSL threats PCIDSS monitoring preventative

Snowden keeps saying that US is still catching our emails

The British television host scored a rare one-on-one interview in Moscow with Edward Snowden for the Sunday’s edition of the “John Oliver Tonight” show. A British channel hosted a rare interview with Snowden in Moscow, the interview was conducted by John Oliver from “John Oliver Tonight.” Aside fr
Publish At:2015-04-08 10:25 | Read:2226 | Comments:0 | Tags:Breaking News Digital ID Hacking Intelligence Security cyber

The Hard Problem of Securing Enterprise Applications

This paper about securing enterprise applications has been sitting in my email since November. I eventually got round to reading it and apologise for not highlighting it sooner.Vendor recommended security controls and compliance requirements leave huge gaps in application security. ... Most have no understanding of how the application platforms work, where s
Publish At:2015-03-20 07:00 | Read:3266 | Comments:0 | Tags:detective ids technical threats defense monitoring correctiv


Share high-quality web security related articles with you:)


Tag Cloud