HackDig : Dig high-quality web security articles for hacker

5 Ways Your Organization Can Ensure Improved Data Security

Each year on January 28, the United States, Canada, Israel and 47 European countries observe Data Privacy Day. The purpose of Data Privacy Day is to inspire dialogue on the importance of online privacy. These discussions also seek to inspire individuals and businesses to take action in an effort to respect privacy, safeguard data and enable trust.In observan
Publish At:2020-02-09 10:22 | Read:303 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data data

Should User Passwords Expire? Microsoft Ends its Policy

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/password.jpg?width=300&amp;name=password.jpg" alt="password" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;">If you have ever worked for an organization that uses Microsoft-based systems, there is a high likelihood that your IT or security team has implemented a po
Publish At:2019-09-19 22:40 | Read:519 | Comments:0 | Tags:Policy Microsoft Password

5 Ways You Can Ensure Improved Data Security

Today, we live in a day and age where businesses are continually crippled by data breaches. From the 2014 JPMorgan Chase hack that compromised 76 million households and 7 million small businesses accounts, to the 2015 Anthem breach that exposed birthdates, social security numbers, addresses, phone numbers and employment information from the second-largest he
Publish At:2016-09-05 07:25 | Read:3719 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data data

The Root Causes of a Poor Security Culture within the Workplace

Demonstrating to employees that security is there to make their life easier, not harder, is the first step in developing a sound security culture. But before we discuss the actual steps to improve it, let’s first understand the root causes of a poor security culture.Security professionals must understand that bad habits and behaviours tend to be contagious.
Publish At:2016-08-30 05:05 | Read:4594 | Comments:0 | Tags:Featured Articles Security Awareness Information Security po

Video Saver PUP Blocks You From Changing Your Default Browser

A potentially unwanted program (PUP) called Video Saver, belonging to the Neobar family of browser hijackers, has been found to use a different trick to “convince” their victims to use their search engine “Search with us!”. It will show the victims a prompt to let them know there are restrictions in effect on their computer and to contact their system admini
Publish At:2015-10-08 01:40 | Read:3941 | Comments:0 | Tags:Security Threat hijack Internet Explorer Pieter Arntz policy

Google blocks Chrome extensions out of the official Store

The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. With new polic
Publish At:2015-06-01 20:55 | Read:4247 | Comments:0 | Tags:Breaking News Cyber Crime Malware Chrome Cybercrime extensio

Google is taking steps to eliminate deceptive download ads.

Reading that Google was adding More Protection from Unwanted Software to their search results was a pleasant surprise. These deceptive ads for third-party downloads that include additional Potentially Unwanted Applications (PUAs) along with the software that you were intending to download have been a plague for some time now. Not only do these ads lead to PU
Publish At:2015-04-09 23:40 | Read:3588 | Comments:0 | Tags:Thought Leadership adwords Chrome Google policy

Sad figures about how many read the license terms

Do you remember our stunt in London where we offered free WiFi against getting your firstborn child? No, we have not collected any kids yet. But it sure was a nice demonstration of how careless we have become with user terms of software and service. It has been said that “Yes, I have read then license agreement” is the world’s biggest lie. Spot on! This was
Publish At:2015-04-08 19:16 | Read:2726 | Comments:0 | Tags:Privacy Security Web agreement end user license agreement EU

Security Policies – To Be Or Not To Be Pointless…

…that was the question.How many people actually find your security policies useful? Go on, guess. I’m willing to bet it’s only audit, risk, compliance management and the third-parties that assess you.Here’s the tweet from Phil Huggins (@oracuk) that kicked off a lively enough debate to make me want to write this. Phil’s core and continuing assertion was that
Publish At:2015-03-18 15:50 | Read:3862 | Comments:0 | Tags:Connecting Security to the Business Featured Articles CISO p

Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization

Over the past several weeks, I’ve visited several national capitals to address cybersecurity concerns with policymakers and industry leaders. One shared challenge facing governments and critical sectors worldwide is the need for a common baseline of cybersecurity risk management guidance that can be utilized by organizations at different levels of sophistica
Publish At:2014-10-28 19:40 | Read:2613 | Comments:0 | Tags:Cybersecurity Cybersecurity Policy Global Security Strategy

A Simple Approach to Mobile Security for Companies

“Mobile security is a Grinch.” Whenever I talk to an information security officer or compliance officer around the holidays, I usually find them in a place that is neither merry nor bright. Christmas is far from the most wonderful time of the year in the information security community. There are budgets being worked on, end-of-the-year projects t
Publish At:2014-09-12 00:50 | Read:3201 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) iPhone Mobile D

ITsecurity Daily Briefing: 08/15/2014

ITsecurity Daily Briefing: 08/15/2014 The ITsecurity daily security briefing: Friday August 15, 2014.NewsPapers/ReportsWebThingsEventsM&AAlertsNewsGameover botnet being rebuilt as NewGOZNow domain generation rather than P2P. “…how long will the threat actor focus on reb
Publish At:2014-08-15 19:30 | Read:7259 | Comments:0 | Tags:News 4G 5G breaches BYOD cyber insurance DDoS Gameover intru


Share high-quality web security related articles with you:)


Tag Cloud