HackDig : Dig high-quality web security articles for hackers

A week in security (January 18 – January 24)

Last week on Malwarebytes Labs, we looked at changes to WhatsApp’s privacy policy, we provided information about Malwarebytes being targeted by the same threat actor that was implicated in the SolarWinds breach, we told the story of ZeroLogon, looked at the pros and cons of Zoom watermarking, studied the vulnerabilities in dnsmasq called DNSpooq, asked if Ti
Publish At:2021-01-25 12:06 | Read:115 | Comments:0 | Tags:A week in security Malwarebytes news bec Brave chrome Cisco

Chrome wants to make your passwords stronger

A common sentiment, shared by many people down the years, is that storing passwords in browsers is a bad idea. Malware, for example, would specifically target password storage in browsers and plunder everything in sight. Password managers weren’t exactly flying off the shelves back in 2007, your only real options were home grown. People ended up saving l
Publish At:2021-01-22 17:48 | Read:128 | Comments:0 | Tags:Privacy browser chrome encrypted malware password manager pa

Ubiquiti breach, and other IoT security problems

Networking equipment manufacturer Ubiquiti sent out an email to warn users about a possible data breach. The email stated there had been unauthorized access to its IT systems that are hosted with a third-party cloud provider. Ubiquiti Networks sells networking devices and IoT devices. It did not specify which products were affected but pointed at UI.com,
Publish At:2021-01-12 16:00 | Read:218 | Comments:0 | Tags:IoT 2fa chastity belt IoT security passwords traffic lights

S3 Ep14: Money scams, HTTPS by default, and hardcoded passwords [Podcast]

byPaul DucklinWe advise you how to react when a friend suddenly asks for money, explain why Chromium is finally aiming for HTTPS by default, and warn you why you should never, ever hardcode passwords into your software.With Kimberly Truong, Doug Aamoth and Paul Ducklin.Intro and outro music: Edith Mudge.LISTEN NOWClick-and-drag on the soundwaves below to ski
Publish At:2021-01-07 09:31 | Read:90 | Comments:0 | Tags:Podcast https Naked Security Podcast passwords Scam

12 Essential Tips for Keeping Your Email Safe

Hey, did you get that sketchy email? You know, the one from that malicious hacker trying to fool us into clicking on some malware? Boy, these criminals are relentless. Wait, what? You clicked on it? Uh-oh.A hypothetical scenario, but one that plays out every day in organizations across the globe — a very real scenario that provides a good reason to take a de
Publish At:2020-12-10 01:50 | Read:226 | Comments:0 | Tags:Featured Articles IT Security and Data Protection email secu

How Quantum Computing Will Affect Computer Security and Passwords

One of the key elements in securing or data and our identities is the use of strong passwords. Using passwords that can’t be guessed—unlike the perennial favorites 123456 or password—helps ensure that hackers and cybercriminals can’t access your computer, mobile device, or websites where you’ve created accounts, and can’t steal your i
Publish At:2020-10-29 09:00 | Read:250 | Comments:0 | Tags:Security & Privacy encryption passwords security

Why Antivirus Protection isn’t Enough to Stay Totally Safe

Viruses and malware are the main tools used by cybercriminals to break into networks and steal data. As a result, anti-malware software like Panda Dome is absolutely essential for keeping your computer and personal data secure. These tools can scan your hard drive for virus infections and remove them automatically. But cyberattacks are becoming more sophisti
Publish At:2020-10-22 06:27 | Read:359 | Comments:0 | Tags:Mobile News Security Antivirus passwords security software V

How to Choose a Good Password

How to Choose a Good Password October 15th, 2020 No Comments Data Privacy, Data Protection, Mobile Security, Online Privacy, Online Safety, Passwords Passwords. We need them for almost everything nowadays. Entering our phones, our computers, social
Publish At:2020-10-14 23:17 | Read:936 | Comments:0 | Tags:Data Privacy Data Protection Mobile Security Online Privacy

Questions to Ask When Conducting Single Sign-On Enrollment

Instead of asking employees to input passwords every day, single sign-on (SSO) offers a simplified but secure authentication process. SSO authentication gives a user the option of choosing a single set of credentials to access multiple accounts and services. So, how can organizations best use SSO for their purposes? This authentication scheme works with the
Publish At:2020-08-11 10:36 | Read:481 | Comments:0 | Tags:Identity & Access Email Identity Identity and Access Managem

A week in security (June 22 – 28)

Last week on Malwarebytes Labs, we provided a zero-day guide for 2020 featuring recent attacks and advanced preventive techniques, and we learned how to cough in the face of scammers, offering security tips for the 2020 tax season. We also looked at a web skimmer hiding within EXIF metadata that was exfiltrating credit cards via image files. In the most r
Publish At:2020-06-29 13:21 | Read:1424 | Comments:0 | Tags:A week in security BlueLeaks Google IBM image files Lucifer

You DID change your password after that data breach, didn’t you?

byPaul DucklinUntil a few years ago, received wisdom for passwords included advice to change them all on a regular and frequent basis, just because you could.The laudable idea was that this reduced the length of time you’d be exposed if your password were breached, and you’d therefore “obviously” be safer as a reult.Ironically, this b
Publish At:2020-06-04 13:15 | Read:845 | Comments:0 | Tags:Data loss data breach passwords

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift is required to maintain cyber resilience. Cybersecurity, often an afterthought in a strong economy, must not be neglected in responding to shifts in the business landscape. As more companies expand their remote workforce, the number of endpoints with access to corpora
Publish At:2020-06-04 12:22 | Read:782 | Comments:0 | Tags:Data Protection Identity & Access Business Continuity C-Suit

The passwordless present: Will biometrics replace passwords forever?

When it comes to securing your sensitive, personally identifiable information against criminals who can engineer countless ways to snatch it from under your nose, experts have long recommended the use of strong, complex passwords. Using long passphrases with combinations of numbers, letters, and symbols that cannot be easily guessed has been the de facto sec
Publish At:2020-04-21 13:11 | Read:1252 | Comments:0 | Tags:Privacy Apple behaviometrics biometrics brute force CCC Chao

Cybersecurity labeling scheme introduced to help users choose safe IoT devices

The Internet of Things (IoT) is a term used to describe a wide variety of devices that are connected to the Internet to improve user experience. For example, a doorbell becomes part of the IoT when it connects to the Internet and allows users to see visitors outside their door. But the way in which some of these IoT devices connect invites serious securit
Publish At:2020-04-07 14:49 | Read:1147 | Comments:0 | Tags:IoT apac cls cybersecurity labeling scheme passwords routers

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as
Publish At:2020-03-11 08:47 | Read:1062 | Comments:0 | Tags:Retail IoT Access Management Connected Devices Customer Expe

Tools

Tag Cloud