HackDig : Dig high-quality web security articles for hacker

15 Easy, Effective Ways to Start Winning Back Your Online Privacy

Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a few minutes. I certainly don’t need any more stuff. However, if I could name one gift that would make me absolutely giddy, it would be getting a chunk of my privacy back. Like most people, the internet knows way too much about me — my age, address, phone
Publish At:2019-10-12 11:20 | Read:185 | Comments:0 | Tags:Family Safety ad blockers children's privacy cloud security

Securing the managed service provider (MSP)

Managed service providers (MSPs) have been a boon to midsize enterprise. They allow for offloading technical debt to an agent with the skills and resources to manage it, thereby giving an organization room to focus on growing a business, rather than the particulars of infrastructure. For a long while, third-party service providers were not targeted dire
Publish At:2019-10-11 23:25 | Read:117 | Comments:0 | Tags:Business advanced persistent threats APT APT attacks APTs en

Cyber insurance: here to stay, whether we like it or not

Cyber insurance has been a big talking point in infosec circles for many months now. We’ve mentioned it in passing ourselves a few times, usually in relation to ransomware attacks. This isn’t surprising; ransomware may not be the threat that brought cyber insurance to life, but it absolutely helped to supercharge it. Depending on where in the world you resid
Publish At:2019-10-10 11:20 | Read:212 | Comments:0 | Tags:Ransomware backups claims cyber insurance cybersecurity poli

Ransomware hits several Spanish city halls

Ransomware is back. Well, in fact, it never went away. However, what is true that from time to time we see more aggressive campaigns with a wider impact, or attacks that are more striking or more flashy. The list of institutions affected by this kind of malware this year keeps growing. In May, the city of Baltimore was attacked with a strand of ransomware ca
Publish At:2019-10-08 10:35 | Read:204 | Comments:0 | Tags:Malware News business governments Ransomware

A week in security (September 30 – October 6)

Last week on Malwarebytes Labs, Malwarebytes renewed its pledge to fight stalkerware for National Cybersecurity Awareness (NCSA) and Domestic Violence Awareness Month. We also looked into what security orchestration is and reported about partnering with security firm, HYAS, to determine the relationship between Magecart Group 4 and Cobalt, the infamous APT
Publish At:2019-10-07 23:20 | Read:204 | Comments:0 | Tags:A week in security Adwind RAT APT Cobalt consumer behavior s

Cyber News Rundown: Data Dash

Reading Time: ~ 2 min. DoorDash Data Breach Nearly five months after a breach, DoorDash has just now discovered that unauthorized access to sensitive customer information has taken place. Among the stolen data were customer names, payment history, and contact info, as well as the last four digits of both customer payment cards and employee bank accounts.
Publish At:2019-10-04 16:10 | Read:295 | Comments:0 | Tags:Industry Intel data breach ransomware

WannaCry – and why it never went away

byPaul DucklinThe infamous ransomware worm WannaCry is already more than two-and-a-half years old.WannaCry spreads using a security hole that was patched two months before the worm first appeared, so you’d be forgiven for assuming that it would have fizzled out by now and become little more than a museum curiosity.But a paper published recently by Soph
Publish At:2019-09-23 05:45 | Read:115 | Comments:0 | Tags:Video malware Naked Security Live ransomware WannaCry

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short answer to that question. The short answer is don’t
Publish At:2019-09-19 23:20 | Read:232 | Comments:0 | Tags:Family Safety BYOD cyberattack cybercrime cybersafety cybers

Incident Response report 2018

 Download full report (PDF) Introduction This report covers our team’s incident response practices for the year 2018. We have thoroughly analyzed all the service requests, customer conversations and incident response deliverables to provide you an overview in numbers. The report includes statistics on how companies reveal data breaches and comprom
Publish At:2019-09-19 18:20 | Read:174 | Comments:0 | Tags:Featured Publications APT DDoS-attacks Financial malware Ind

Island hopping: the tactic de rigueur among cyberattackers

Ransomware is undergoing something of a revival. In 2018, detections of this type of malware fell, while other cyberthreats such as cryptojacking experienced major growth. However, in the first quarter of 2019, ransomware attacks against companies increased 195%. The most extreme proof of this resurgence was a series of targeted ransomware attacks against lo
Publish At:2019-09-19 17:05 | Read:77 | Comments:0 | Tags:Malware News business governments Ransomware

Hacker conventions: Black Hat and DEF CON – Intego Mac Podcast, Episode 96

The Intego Mac Podcast episode 96 is now available!Summer is when hackers get together to present and discuss malware, vulnerabilities, and exploits. Two big hacker conventions - Black Hat and DEF CON - were held recently, and we discuss some of the Mac-related discoveries. We also look at some interesting news, including certain Macs being banned by the FCC
Publish At:2019-09-19 16:40 | Read:124 | Comments:0 | Tags:Intego Mac Security Podcast Black Hat DEF CON Intego Mac Pod

When PSD2 Opens More Doors: The Risks of Open Banking

By Feike Hacquebord, Robert McArdle, Fernando Mercês, and David Sancho As more industries adapt to cater to the increasingly mobile market, the financial industry is the latest to experience a shake-up. The Revised Payment Service Directive (PSD2) – also known as Open Banking – is a new set of rules for the European Union (EU) that’s expected to affect
Publish At:2019-09-19 14:50 | Read:166 | Comments:0 | Tags:Bad Sites Internet of Things Malware Mobile Ransomware Vulne

The Clicking Bot Applications

Cyber crime, like any crime, has its motives; each malware has its own malicious profit. Spyware spies on you. Ransomware demands a ransom to decrypt your private digital data. Phishing Malware phishes for your username, password or account numbers. Installation-fraud achieves fake software installations. Ad fraud fraudulently represents online advertisement
Publish At:2017-11-07 10:45 | Read:40682 | Comments:2 | Tags:Analysts Android App Security Mobile Malware Threat Research

The GIBON Ransomware appears in the threat landscape

A new strain of ransomware dubbed GIBON ransomware was spotted by the ProofPoint researcher Matthew Mesa that observed it being distributed via malspam. The spam messages use a malicious document as attachment containing macros that once enabled will download and install the ransomware on a victim’s machine. The researcher dubbed the ransomware GIBON b
Publish At:2017-11-06 10:45 | Read:4759 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime GIBON Ransomwar

MBR-ONI ransomware involved in targeted attacks against Japanese organizations

MBR-ONI is a new ransomware that is being used for targeted attacks in Japan, experts speculate it was used to cover larger hacking campaigns. MBR-ONI is a new ransomware that is being used for targeted attacks in Japan, it is a bootkit ransomware that uses a modified version of the legitimate open-source disk encryption utility DiskCryptor to encrypt the fi
Publish At:2017-11-01 19:50 | Read:4565 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime Hacking malware


Share high-quality web security related articles with you:)


Tag Cloud