HackDig : Dig high-quality web security articles for hackers

Coronavirus impacts security conferences and events: check your schedule

With coronavirus starting to take hold globally, international travel restrictions are kicking in and more workplaces are advising to work from home whenever possible. When self-isolation is a potential solution, public gatherings are increasingly looking like a terrible idea. Events are becoming a bit of a hotspot for cases, leading to inevitably bizarre sc
Publish At:2020-03-12 15:31 | Read:700 | Comments:0 | Tags:Security world black hat bsides cancellations conferences co

Ironpie robot vacuum can suck up your privacy

byLisa VaasAccording to its maker, Trifo, the Ironpie home surveillance robot vacuum isn’t just your dust bunnies’ worst nightmare. It also chases intruders away with its “advanced vision system”.I am always alert and never sleep on the job.Funny thing about that always alert thing. It’s true, the artificial intelligence (AI) -enhanced inte
Publish At:2020-03-02 09:21 | Read:434 | Comments:0 | Tags:2-factor Authentication IoT Privacy Security threats Vulnera

Introducing Lock and Code: a Malwarebytes Labs podcast

Intrepid Labs readers might be happy to know that we’re stepping into territory long-requested and desired: we’re launching a podcast. Malwarebytes researchers and reporters are on the front lines of cybercrime, delivering both fast-breaking news and thoughtful features on our blog to raise awareness and help users stay safe and private online
Publish At:2020-02-25 13:50 | Read:546 | Comments:0 | Tags:Podcast cybercrime cybersecurity awareness lock and code loc

Red Teaming for Blue Teamers: A Practical Approach Using Open Source Tools

For the majority of people in the information security world, the act of offensive hacking is something they are tasked with protecting against but have little ability to do themselves. That is like asking a professional boxer to enter the ring without knowing how to throw a punch. Sure, you may be able to get in and last a few rounds, but eventually, a form
Publish At:2020-02-19 00:33 | Read:527 | Comments:0 | Tags:Events Blue Team Red Team RSA

Threat spotlight: The curious case of Ryuk ransomware

Ryuk. A name once unique to a fictional character in a popular Japanese comic book and cartoon series is now a name that appears in several rosters of the nastiest ransomware to ever grace the wild web. For an incredibly young strain—only 15 months old—Ryuk ransomware gaining such notoriety is quite a feat to achieve. Unless the threat actors behind its
Publish At:2019-12-12 21:50 | Read:1291 | Comments:0 | Tags:Threat spotlight AES average ransom amount BitPaymer BitPaym

A C(I)SO View on RSA 2017: “China Is Hiring in the US”

Two weeks ago, while visiting the yearly security gathering at the RSA conference in San Francisco’s Moscone center complex (and adjacent hotels – it’s growing like mad), I was walking across the North and South Expo halls to check out some vendors (Several I had appointments with, some by curiosity, and a few that were really new kids on the block.) selling
Publish At:2017-02-28 04:55 | Read:4746 | Comments:0 | Tags:Events Featured Articles CISO Infosec RSA security

RSA Wrap-Up: Top Stories From the 2017 RSA Conference

I think it’s safe to say that we’ve all learned, in some way or another, that talk is cheap. From an early age, and especially into adulthood, we’re presented with situations where we feel like we’re being sold something that benefits the seller more than it does us. This fundamental human challenge is front and center in the field of
Publish At:2017-02-22 02:00 | Read:3571 | Comments:0 | Tags:CISO Education Internet of Things (IoT) IoT Security Profess

How to Bury a Major Breach Notification

Amid the hustle and bustle of the RSA Security Conference in San Francisco last week, researchers at RSA released a startling report that received very little press coverage relative to its overall importance. The report detailed a malware campaign that piggybacked on a popular piece of software used by system administrators at some of the nation’s lar
Publish At:2017-02-21 17:05 | Read:4470 | Comments:0 | Tags:Other Adrian Grigorof EventID.net eventreader.com firegen.co

RSA Tips for CISOs: From 10 Years Ago to Today

I’ve heard it said that experience is something you don’t get until just after you need it. That essentially defines most information security programs I’ve seen. Generally speaking, chief information security officers (CISOs) and security managers know what needs to be done. The outcome, however, is often not quite what they expected. Teac
Publish At:2017-02-17 11:25 | Read:4050 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Education Pro

The Red Portal: IBM X-Force Red’s Collaborative Client Experience

IBM X-Force Red is a group of security professionals and ethical hackers whose goal is to help businesses discover vulnerabilities in their computer networks, hardware and software applications before cybercriminals do. X-Force Red, part of IBM Security Services, also examines human security vulnerabilities in daily processes and procedures that attackers of
Publish At:2017-02-10 13:10 | Read:5240 | Comments:0 | Tags:Application Security Mobile Security Network & Endpoint Thre

Security Bulletins on Trial

Have you ever had one of those moments where, in the movie of your life, the actor playing you will voice over with the words, “I should have immediately known I’d come to regret this decision”? Seeing the RSA Call for Speakers suggest originality in the presentation style (via mention of a rock opera) sent us down the path of a mock trial.While
Publish At:2017-02-10 12:25 | Read:4081 | Comments:0 | Tags:Off Topic Bulletin RSA security

Secure Your Smart Phones at RSA with Zimperium

Mobile is Your Greatest Cyber Vulnerability and the Zimperium team will be demonstrating the latest in enterprise Mobile Threat Defense at RSA. Get a Trial at the Expo Booth Visit our expo booth N4710, Moscone North to meet with the zLabs Global Threat Intelligence team, for an in-depth look at our industry-leading research and Mobile Threat Defense solution
Publish At:2017-02-08 09:10 | Read:4169 | Comments:0 | Tags:Events Mobile Threat Defense RSA RSA 2017

What’s on Tap for Tripwire at RSA Conference 2017

Every year, the RSA Conference attracts the industry’s most respected thought leaders, seasoned security experts and aficionados from around the globe. In 2016, it saw a record of over 40,000 attendees – all hungry to discuss and debate pressing cybersecurity issues.As one of Tripwire’s top information security conferences for 2017, we have no do
Publish At:2017-02-08 05:10 | Read:4430 | Comments:0 | Tags:Tripwire News RSA RSA 2017 RSAC

Voice Privacy in the Enterprise: Are You Listening?

Keyboarding is so last century. Whether we’re asking Amazon Echo how long it’ll take us to get to work, telling the TV to change channels or directing Siri summon a cab late on a Saturday night, voice control has made interacting with our devices a lot easier. As with all tech advances, however, those benefits are balanced out by some cons, which
Publish At:2017-02-07 11:30 | Read:3679 | Comments:0 | Tags:Security Intelligence & Analytics Connected Devices Internet

Where to find Lookout at RSA 2017

After a year full of headlines about data breaches and cyber war, it’s clear people want to know about the targeted attacks facing them. That’s what we’re providing at this year’s RSA. We’ve planned a talk, a happy hour, and a great booth for all RSA attendees, especially those interested in learning about targeted mobile threats to corporate data. The tal
Publish At:2017-02-04 01:50 | Read:3593 | Comments:0 | Tags:Enterprise Mobile Security conference mobile security RSA RS


Share high-quality web security related articles with you:)