HackDig : Dig high-quality web security articles for hackers

Apple confirms iOS 10 kernel source code left unencrypted intentionally

Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no impact on security. The news is intriguing, while Apple announced the new release of its mobile operating system, the iOS 10, the experts discovered that its kernel is unencrypted. The researchers from MIT Technology who reviewed the
Publish At:2016-06-25 00:00 | Read:3952 | Comments:0 | Tags:Breaking News Mobile Security Apple encryption Hacking iOS 1

Tracking Administrator Sessions in Windows Environments

[The post Tracking Administrator Sessions in Windows Environments has been first published on /dev/random] Tracking users with privileged access is a critical task in your security policy (SANS Critical Security Control #12). If the key point is to restrict the number of “power users” to the lowest, it’s not always easy. Most of them will a
Publish At:2015-09-24 13:05 | Read:5650 | Comments:0 | Tags:Logs Management / SIEM OS PowerShell Security access Adminis

Publication of OS X Yosemite Zero-Day Highlights Importance of Responsible Disclosure

A security researcher has published a zero-day vulnerability found in the newest versions of OS X Yosemite apparently out of protest to Apple’s irresponsible behavior when it comes to patching its software for vulnerabilities.In a post published on his blog (to which we have deliberately not provided a link for security reasons), researcher Stefan Esse
Publish At:2015-07-28 07:55 | Read:2960 | Comments:0 | Tags:Latest Security News Apple disclosure OS Yosemite

Google | Project Vault

Google’s Project Vault Is A Secure Computing Environment On A Micro SD Card, For Any Platform   Project Vault is a secure computer contained entirely on a micro SD sized device. Google’s ATAP said the micro SD format made sense because there’s already advanced security features on your phone, contained in the SIM card, which protects the things importa
Publish At:2015-06-09 16:15 | Read:5677 | Comments:0 | Tags:Cyber Security Security Updates Technology 0xicf ARM ARTOS A

Which operating system is the most secure? Four points to remember.

No, you are almost certainly wrong if you tried to guess. A recent study shows that products from Apple actually are at the top when counting vulnerabilities, and that means at the bottom security-wise. Just counting vulnerabilities is not a very scientific way to measure security, and there is a debate over how to interpret the figures. But this is anyway a
Publish At:2015-02-26 12:15 | Read:3091 | Comments:0 | Tags:Security Android desktop iOS laptop linux operating system O


Share high-quality web security related articles with you:)