HackDig : Dig high-quality web security articles for hackers

Updated AnarchyGrabber Steals Passwords, Spreads to Discord Friends

Researchers found an updated version of AnarchyGrabber that steals victims’ plaintext passwords for and infects victims’ friends on Discord.Detected as AnarchyGrabber3, the new trojan variant modified the Discord client’s %AppData%Discord[version]modulesdiscord_desktop_coreindex.js file upon successful installation. This process gave the ma
Publish At:2020-05-26 08:09 | Read:120 | Comments:0 | Tags:IT Security and Data Protection Latest Security News Anarchy

Security tips for working from home (WFH)

Over the last decade, remote work and working from home has grown in popularity for many professionals. In fact, a 2018 study found more than 70 percent of global employees work remotely at least once per week. However, the coronavirus pandemic and resulting lockdown in many parts of the world have forced a large number of employees into unfamiliar
Publish At:2020-03-19 14:26 | Read:504 | Comments:0 | Tags:How-tos coronavirus password remote remote work remote worke

The War of Passwords: Compliance vs NIST

The most recent National Institute of Standards and Technology (NIST) guidelines have been updated for passwords in section 800-63B. The document no longer recommends combinations of capital letters, lower case letters, numbers and special characters. Yet most companies and systems still mandate these complexity requirements for passwords. What gives?There’s
Publish At:2020-03-05 04:40 | Read:544 | Comments:0 | Tags:IT Security and Data Protection compliance NIST password

A Guide to Digital Privacy for You and Your Family

Having worked with many individuals responding to incidents where their digital private images were shared without consent, social media or email accounts had unauthorised access, and even physical safety was a concern, it is all too familiar how terrifying the unknown can be. As someone who has been on both the victim’s and later the responder’s side,
Publish At:2020-02-15 17:09 | Read:589 | Comments:0 | Tags:IT Security and Data Protection digital security password Pr

5 Ways Your Organization Can Ensure Improved Data Security

Each year on January 28, the United States, Canada, Israel and 47 European countries observe Data Privacy Day. The purpose of Data Privacy Day is to inspire dialogue on the importance of online privacy. These discussions also seek to inspire individuals and businesses to take action in an effort to respect privacy, safeguard data and enable trust.In observan
Publish At:2020-02-09 10:22 | Read:552 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data data

A week in security (November 11 – 17)

Last week on Malwarebytes Labs, we offered statistics and information on a sneaky new Trojan malware for Android, inspected a bevy of current Facebook scams, and explained the importance of securing food and agriculture infrastructure. We also released our latest report on cybercrime tactics and techniques, offering new telemetry about the many cybersecu
Publish At:2019-11-18 16:50 | Read:1050 | Comments:0 | Tags:A week in security CTNT cybercrime tactics & techniques cybe

A week in security (October 14 – 20)

Last week on Malwarebytes Labs, we tried to unlock the future of the password (its vulnerabilities, current alternatives, and possible future disappearance), analyzed the lagging response by many businesses in adopting a patch for Pulse VPN vulnerability, looked at Instagram’s bulked-up security against phishing emails scams, and were reminded that ransomwar
Publish At:2019-10-21 16:50 | Read:1238 | Comments:0 | Tags:A week in security amazon Dark Web domestic abuse domestic a

Should User Passwords Expire? Microsoft Ends its Policy

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/password.jpg?width=300&amp;name=password.jpg" alt="password" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;">If you have ever worked for an organization that uses Microsoft-based systems, there is a high likelihood that your IT or security team has implemented a po
Publish At:2019-09-19 22:40 | Read:665 | Comments:0 | Tags:Policy Microsoft Password

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Power grids are a tantalizing targets for sophisticated attackers. In the U.S., every major economic sector relies heavily on electricity. That dependence includes the military as well. Given the rising threat levels, it isn’t surprising that there are calls for the Department of Defense to ends its reliance on the power grid for key military installat
Publish At:2017-10-31 05:50 | Read:3088 | Comments:0 | Tags:Energy & Utility Risk Management Access Management Energy an

Have We Been Wrong All Along About Good Password Practices?

Have we been creating passwords the wrong way all along? You might think so, based on the new set of guidelines the National Institute of Standards and Technology (NIST) recently issued about the best password practices. NIST Special Publication 800-63 is a comprehensive guide to managing digital identity, and its recommendations are widely adopted by organi
Publish At:2017-09-21 00:50 | Read:4871 | Comments:0 | Tags:Endpoint Identity & Access Authentication National Institute

Green Security Technology: The New Corporate Color?

From carbon-neutral clouds to net-zero data centers to completely renewable power, green technology is rapidly becoming a viable option for global corporations hoping to both improve long-term outlooks and align operations with changing consumer sentiment. Consider current projects by companies such as Salesforce, Apple and Toyota. According to Greentech Med
Publish At:2017-09-15 15:35 | Read:3954 | Comments:0 | Tags:CISO Cloud Security Cognitive Artificial Intelligence (AI) C

The Untapped Potential of Two-Factor Authentication

Remote authentication traditionally depends on two factors: something the user knows, such as a password, and something the user has, such as a hardware token. This is called two-factor authentication (2FA). In practice, something that the entity knows typically serves as the primary method of authentication. Passwords have long reigned supreme because the
Publish At:2017-08-09 10:45 | Read:3797 | Comments:0 | Tags:Identity & Access Access Management Authentication Authentic

Administrator Credentials: A Security Breach Waiting to Happen

A potential security risk lurks within every business, from the extensive enterprise computer network to the small business with a handful of synced desktops and laptops. This security hole can be attributed to administrator credentials. Plugging the hole is challenging because administrator accounts and their access credentials are essential to the security
Publish At:2017-07-25 11:50 | Read:3040 | Comments:0 | Tags:Identity & Access Risk Management Identity and Access Manage

The New NIST Digital Identity Guidelines and What They Mean to You

The National Institute of Standards and Technology (NIST) recently released a draft of its Digital Identity Guidelines that included some significant and noteworthy changes. While the public comment period has closed, the document still has to go through an internal review process that is expected to last until the end of this summer. Big Changes to the NIS
Publish At:2017-06-07 21:40 | Read:3839 | Comments:0 | Tags:Identity & Access Access Management Authentication Multifact

One Small Sticky Note on a Password Wall, One Giant Leap for Security

Welcome to “In Security,” the web comic that takes a lighter look at the dark wave of threats crashing across business networks, endpoints, data and users. Get acquainted with the team and catch up by reading Episode 001, Episode 002, Episode 003, Episode 004, Episode 005 and Episode 006 Dylan may think his wall of passwords is a giant leap
Publish At:2017-04-17 01:45 | Read:4193 | Comments:0 | Tags:Identity & Access Authentication In Security Multifactor Aut

Announce

Share high-quality web security related articles with you:)

Tools