HackDig : Dig high-quality web security articles for hacker

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Power grids are a tantalizing targets for sophisticated attackers. In the U.S., every major economic sector relies heavily on electricity. That dependence includes the military as well. Given the rising threat levels, it isn’t surprising that there are calls for the Department of Defense to ends its reliance on the power grid for key military installat
Publish At:2017-10-31 05:50 | Read:1739 | Comments:0 | Tags:Energy & Utility Risk Management Access Management Energy an

Have We Been Wrong All Along About Good Password Practices?

Have we been creating passwords the wrong way all along? You might think so, based on the new set of guidelines the National Institute of Standards and Technology (NIST) recently issued about the best password practices. NIST Special Publication 800-63 is a comprehensive guide to managing digital identity, and its recommendations are widely adopted by organi
Publish At:2017-09-21 00:50 | Read:2697 | Comments:0 | Tags:Endpoint Identity & Access Authentication National Institute

Green Security Technology: The New Corporate Color?

From carbon-neutral clouds to net-zero data centers to completely renewable power, green technology is rapidly becoming a viable option for global corporations hoping to both improve long-term outlooks and align operations with changing consumer sentiment. Consider current projects by companies such as Salesforce, Apple and Toyota. According to Greentech Med
Publish At:2017-09-15 15:35 | Read:2199 | Comments:0 | Tags:CISO Cloud Security Cognitive Artificial Intelligence (AI) C

The Untapped Potential of Two-Factor Authentication

Remote authentication traditionally depends on two factors: something the user knows, such as a password, and something the user has, such as a hardware token. This is called two-factor authentication (2FA). In practice, something that the entity knows typically serves as the primary method of authentication. Passwords have long reigned supreme because the
Publish At:2017-08-09 10:45 | Read:2152 | Comments:0 | Tags:Identity & Access Access Management Authentication Authentic

Administrator Credentials: A Security Breach Waiting to Happen

A potential security risk lurks within every business, from the extensive enterprise computer network to the small business with a handful of synced desktops and laptops. This security hole can be attributed to administrator credentials. Plugging the hole is challenging because administrator accounts and their access credentials are essential to the security
Publish At:2017-07-25 11:50 | Read:1679 | Comments:0 | Tags:Identity & Access Risk Management Identity and Access Manage

The New NIST Digital Identity Guidelines and What They Mean to You

The National Institute of Standards and Technology (NIST) recently released a draft of its Digital Identity Guidelines that included some significant and noteworthy changes. While the public comment period has closed, the document still has to go through an internal review process that is expected to last until the end of this summer. Big Changes to the NIS
Publish At:2017-06-07 21:40 | Read:2096 | Comments:0 | Tags:Identity & Access Access Management Authentication Multifact

One Small Sticky Note on a Password Wall, One Giant Leap for Security

Welcome to “In Security,” the web comic that takes a lighter look at the dark wave of threats crashing across business networks, endpoints, data and users. Get acquainted with the team and catch up by reading Episode 001, Episode 002, Episode 003, Episode 004, Episode 005 and Episode 006 Dylan may think his wall of passwords is a giant leap
Publish At:2017-04-17 01:45 | Read:2897 | Comments:0 | Tags:Identity & Access Authentication In Security Multifactor Aut

iCloud Hacking: The Cybersecurity Gift that Keeps on Giving

You probably remember the massive iCloud breach in 2014 that resulted in compromised celebrity photos spreading through the internet like wildfire. That egregious invasion of privacy caused great embarrassment and damage to the reputations of nearly 100 A-list stars.Fortunately, these bad deeds did not go unpunished. In 2016, two men were brought to justice
Publish At:2017-04-03 10:15 | Read:3771 | Comments:0 | Tags:Featured Articles IT Security and Data Protection hack iClou

2.2 Million Email Addresses Exposed in Wishbone Data Breach

A popular social media app known as Wishbone has suffered a data breach that exposed 2.2 million email addresses along with 287,000 cell numbers.In the middle of March 2017, security researcher Troy Hunt received a MongoDB database that belongs to Wishbone. The app, first founded in 2015, allows users to vote on two-choice polls. Over the past two years, it&
Publish At:2017-03-16 18:05 | Read:2917 | Comments:0 | Tags:Latest Security News breach password social networking

23 Incident Response Tips for Home Computer Use or Unwanted Social Media Attention

One of the unpleasant realities of having a ubiquitous and very public online profile through social media is the risk of attracting an unwanted “follower” or “friend” who turns into an online-troll or stalker. Over the past few weeks, I’ve been contacted by a number of folks on “what to do” when bad things start happening online.Whether you suspect your com
Publish At:2017-03-10 11:25 | Read:2384 | Comments:0 | Tags:Featured Articles Security Awareness hack password social me

32 Million Yahoo Accounts Affected by Forged Cookies, Investigation Finds

Investigators have confirmed that attackers used or took forged cookies for 32 million Yahoo accounts after stealing the company’s proprietary software.In a filing submitted to the U.S. Securities and Exchange Commission, Yahoo explains that an Independent Committee of the Board of Directors analyzed three security incidents that the company disclosed
Publish At:2017-03-08 04:10 | Read:1625 | Comments:0 | Tags:Latest Security News password Privacy Yahoo

It’s Time for Users to Pony Up and Quit Reusing Passwords

Did you ever notice that no two Thoroughbred race horses are ever named alike? Did you ever wonder how they do that? And did you wonder if that uniqueness has anything to do with your responsibilities as a C-level executive? Training Users to Stop Reusing Passwords When you have numerous users and services under your protective umbrella, you expect those use
Publish At:2017-02-16 17:00 | Read:2740 | Comments:0 | Tags:CISO Fraud Protection Identity & Access Multifactor Authenti

Two-Factor Authentication: A Little Goes a Long Way

Despite the security industry’s best efforts to educate users about the weaknesses of password authentication, awareness remains frustratingly low. Keeper Security recently analyzed 10 million compromised accounts and found that just 25 passwords made up more than half of the list. Nearly 17 percent of users were guarding their accounts with the passwo
Publish At:2017-01-30 19:15 | Read:2157 | Comments:0 | Tags:Identity & Access Authentication Biometric Security Biometri

Hacked by a Kid?! A Story to Illustrate the State of Authentication Today

You may have seen the recent headlines covering the story of a snoozing mother who, while taking a nap on the couch, was innocently hacked by her 6-year-old. The child purchased $250 worth of toys on Amazon using her mother’s fingerprint for authentication. What an ingenious young one indeed! Humorous as this story may be, it points out one of the many
Publish At:2017-01-24 15:55 | Read:2991 | Comments:0 | Tags:Data Protection Identity & Access Authentication Biometric S

Supercell Urges Users to Reset Passwords Following Forum Breach

Supercell, a mobile game development company, has urged users to reset their passwords following a breach that affected its forum.An administrator for the firm, which has produced popular multiplayer games like Clash of Clans and Clash Royale, announced the incident on 17 January:“We’re currently looking into report that a vulnerability allowed t
Publish At:2017-01-20 00:35 | Read:2467 | Comments:0 | Tags:Latest Security News breach forum password

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud