HackDig : Dig high-quality web security articles for hacker

The Hay CFP Management Method

By Andrew Hay, Co-Founder and CTO, LEO Cyber Security. I speak at a lot of conferences around the world. As a result, people often ask me how I manage the vast number of abstracts and security call for papers (CFPs) submissions. So I thought I’d create a blog post to explain my process. For lack of a better name, let’s call it the Hay CFP Management Method.
Publish At:2017-09-26 00:50 | Read:271 | Comments:0 | Tags:News Security Research

US Bans the Use of Kaspersky Software in Federal Agencies

We are living through one of the most precarious moments in international relations of the last several years. Threats of commercial warfare, espionage, and sanctions are constantly threatening to polarize two major world powers — the United States and Russia — and embroil them in perpetual conflict. This can no doubt have huge — and serious — consequences i
Publish At:2017-09-14 13:35 | Read:229 | Comments:0 | Tags:News cyberwarfare kaspersky russia

BlueBorne- the lethal attack to take over your devices

The latest attack Blueborne is taking over by storm , lets read about it in concise, the attack method and the details of this bug. A series of vulnerabilities have been unearthed in the implementation of Bluetooth which allows hackers to take over your computers/ tablets/ smartphones whenever Bluetooth is on. A total of eight critical Bluetooth vulnerabilit
Publish At:2017-09-13 14:25 | Read:338 | Comments:0 | Tags:News blueborne bluetooth hacking hacking IOT

Why is Online Voting Not a Good Idea?

Online voting could introduce great risk into the election system by threatening voters It’s the 21st century, and we are living in the future as technology is advancing at a rapid speed. It has never been easier to shop online and to do online banking. It is possible money will even cease to exist as blockchain digital currencies such as Bitcoin and Monero
Publish At:2017-09-12 06:15 | Read:365 | Comments:0 | Tags:Mobile News News Cybercrime cybersecurity Hackers

Equifax hit with a data breach possibly affecting half of the US population

This Thursday Equifax, one of the three major credit bureaus in the US, announced that cyber security incident involving consumer information of nearly half of the population in the US had been spotted on July 29th, 2017. In the press release published yesterday, they stated that based on their internal investigation the data breach began taking place in mid
Publish At:2017-09-08 05:50 | Read:279 | Comments:0 | Tags:Mobile News News companies cybersecurity urgent

Pacemakers prone to getting hacked

Recently the The FDA and Homeland Security have issued alerts about vulnerabilities in 4,65,000 pacemakers. The devices can be remotely “hacked” to increase activity or reduce battery life, potentially endangering patients. Feasible vulnerabilities: Absence of memory and encryption: In such embedded devices there is a lack to support proper cryptographic e
Publish At:2017-09-05 12:30 | Read:361 | Comments:0 | Tags:News cryptography Exploit hacking IOT news pacemaker

Facebook Messenger: Beware of malware!

New cross-platform malware for Windows/Mac/Linux spreading via Facebook Messenger A cyber-criminal gang is using Facebook Messenger to spread a new malware specimen through links to spoof websites. This threat, which is highly sophisticated and has been customized for each Web browser, has been uncovered by a security expert who received a suspicious message
Publish At:2017-08-31 07:00 | Read:250 | Comments:0 | Tags:Mobile News News Facebook Malware

Are All Hackers Bad? 7 Types of Hackers

Top Seven Types of Hackers You hear about leaks and hacks on a daily basis, but most of the times the identity of the people involved in these events remain hidden from the society. Every time there is a cyber-incident, the media releases a lot of information about the damages, but you rarely get much about the hackers themselves. Sometimes names of a myster
Publish At:2017-08-30 12:35 | Read:555 | Comments:0 | Tags:Mobile News News Security Hackers Malware tips

What is Net Neutrality and How to Voice Your Opinion?

What happens when cable and phone companies are left to their own devices? Federal Communications Commission (FCC) will soon stop accepting comments on Net Neutrality. There has been a lot of confusion amongst people who are either not technology savvy or not familiar enough with the ongoing debate. We spent years following the conversation and researching t
Publish At:2017-08-28 05:20 | Read:519 | Comments:0 | Tags:Mobile Security News Security Communications Internet Securi

Facebook Telepathy Texting – Could It Be Hacked?

Is telepathy texting the next step in technology communications? With over 2 billion registered members, Facebook is the world’s most popular online service. But to maintain that title, Facebook is constantly developing new services to keep people logging in. In a recent video conference, Facebook chief Mark Zuckerberg discussed one of the cutting edge proje
Publish At:2017-08-25 06:35 | Read:398 | Comments:0 | Tags:Mobile Security News Social Media Facebook social media tech

PlayStation Network Hacked. Again.

When mysterious tweets appeared on the official Sony PlayStation Twitter feed on Monday morning, it quickly became clear that the account had been hacked. Indeed, the hackers made little effort to hide their activities, proudly announcing that the breach had been carried out by the OurMine Security Group. Photo credit: Twitter Initially there were a few twee
Publish At:2017-08-23 14:50 | Read:383 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats

Even with security technology in place, companies know that it is not possible to prevent all cyberattacks. At any rate, however, the damages caused by attacks can be greatly mitigated with quick and decisive action in response to threats. The answer is to use a cybersecurity solution capable of monitoring, uninterruptedly, all applications in order to block
Publish At:2017-08-22 04:50 | Read:365 | Comments:0 | Tags:News Panda Security alliance cybersecurity deloitte

Detect and Prevent Data Exfiltration Webinar with Infoblox

Please join SANS Institute Instructor and LEO Cyber Security Co-Founder & CTO Andrew Hay and Infoblox Security Product Marketing’s Sam Kumarsamy on Thursday, August 17th, 2017 at 1:00 PM EDT (17:00:00 UTC) as they present a SANS Institute webinar entitled Detect & Prevent Data Exfiltration: A Unique Approach. Overview Data is the new currency i
Publish At:2017-08-16 18:15 | Read:305 | Comments:0 | Tags:News Webinar

US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch attacks on smart home devices.Trend Micro’s recent report shows more than 1.8 million cyberattacks have been conducted through home network routers in the past six months.
Publish At:2017-08-16 02:40 | Read:352 | Comments:0 | Tags:Don't miss Featured news News Internet of Things survey Tren

Understanding your responsibility and security in the cloud

In this podcast recorded at Black Hat USA 2017, Chris Drake, CEO at Armor, talks about the difference between security of the cloud and security in the cloud.Here’s a transcript of the podcast for your convenience.I’m Chris Drake, founder and CEO of Armor. We are a cloud cybersecurity services company and I wanted to talk today
Publish At:2017-08-09 19:55 | Read:351 | Comments:0 | Tags:Don't miss Editor's choice Featured news News Armor Black Ha

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud