HackDig : Dig high-quality web security articles for hacker

Tornados, Necessity, and the Evolution of Mitigating Controls

According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount and type of wind
Publish At:2019-12-02 15:30 | Read:208 | Comments:0 | Tags:Articles controls history mitigating controls safety securit

Instagram clamps down on fake messages with anti-phishing tool

Instagram accounts will always be a popular target for scammers. You might not think it’s a big deal if someone has their account swiped, but it’s often the vanguard of many online businesses. A takeover, or a deletion, can be absolutely devastating. Smart hacking crews are always in the background, waiting to see what they can get away with—and it’s not jus
Publish At:2019-10-15 23:20 | Read:231 | Comments:0 | Tags:Social engineering anti-phishing anti-phishing tool email em

The New Battlefield: Why Nation-State Malware is Winning

This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use. So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lie
Publish At:2017-04-25 18:10 | Read:3441 | Comments:0 | Tags:Government Threats Battlefield CIA criminals Federal governm

What Will Protect Your Connected Car Against Hackers?

There are a lot of great benefits to a connected car like the new Toyota Highlander: increased integration, a more comfortable driving experience and personalized controls, just to name a few. However, with increased computing power comes increased risk that hackers could take control of a car remotely, causing it to speed up, turn off, or turn unexpectedly,
Publish At:2016-12-19 03:45 | Read:3858 | Comments:0 | Tags:Featured Articles Internet of Things breach cybersecurity Ha

Some Unorthodox Back-To-School Online Safety Tips For the Tech Savvy

Have you read the latest online safety back-to-school tips? Some of the advice is excellent, such as resisting the urge to click on unsolicited links in text messages, locking your phone before you put it down, and never sharing your passwords.However, to the tech-savvy among us, these bits of advice make us roll our eyes with a sigh of “same old….”So,
Publish At:2016-09-01 12:05 | Read:3544 | Comments:0 | Tags:Featured Articles Security Awareness Hacker online password

Internet Safety for Kids – Digital Parenting Do’s and Don’ts

Part of being a parent is keeping kids safe, but it’s also about helping kids grow up to become responsible, independent adults. But there’s a bit of friction between these two ideas. How do parents find the right balance between protecting their kids and letting them behave independently? This friction is very apparent when it comes to how parents let
Publish At:2016-06-16 08:00 | Read:4134 | Comments:0 | Tags:Family Protection Security children children internet safety

The Dronecatcher evolves featuring a new improvement

Delft Dynamics conducted a successful test, where a drone was taken out of the air by another unmanned aerial vehicle named DroneCatcher. The drone industry is growing at a rapid pace. Aerospace research company Teal Group has estimated that sales of military and civilian drones will total over $89 billion in the next 10 years. The possible fields of applica
Publish At:2016-04-04 22:25 | Read:3034 | Comments:0 | Tags:Breaking News Security Dronecatcher Drones privacy safety se

Gmail to warn you if your friends aren’t using secure e-mail

EnlargeLikewise, if you receive a message that can’t be authenticated, you won’t be hit by klaxon alarms. Instead, Gmail will replace the sender's profile photo with an incriminating question mark, identifying them as potentially suspicious. What you do with that information after that, of course, is entirely up to you. Despite the advent of this new warning
Publish At:2016-02-10 10:00 | Read:2540 | Comments:0 | Tags:Risk Assessment Technology Lab email gmail google privacy sa

What are your kids doing for Safer Internet Day?

Today is Safer Internet Day – a day to talk about what kind of place the Internet is becoming for kids, and what people can do to make it a safe place for kids and teens to enjoy. We talk a lot about various online threats on this blog. After all, we’re a cyber security company, and it’s our job to secure devices and networks to keep people protected from mo
Publish At:2016-02-09 12:35 | Read:2623 | Comments:0 | Tags:Security Social media F-Secure Internet mobile protection sa

Filling those last minute stockings? Here are tips to keep you safe shopping on mobile

It’s no longer uncommon to do your shopping on your mobile device. Ever sat on the couch watching Netflix and browsing your favorite retailer on your tablet? Many of us have been there. Indeed, 52 percent of millennials make purchases on their mobile devices at least a few times a month, according to research from Invoca. While this is no longer a foreign co
Publish At:2015-12-21 17:20 | Read:2268 | Comments:0 | Tags:Mobile Tips + Tricks mobile shopping safety Security

The Internet of Toys: Child Safety and Public Disclosure

As Christmas approaches, like most parents and grandparents, I set off shopping with my wife to seek out suitable presents to drop into Santa’s sack for the festive season of giving.My granddaughter loves nothing more than to get her little hands on an iPad (on which she stabs around under supervision) to enjoy some of the rich entertainment hosted on
Publish At:2015-12-04 16:35 | Read:4371 | Comments:0 | Tags:Featured Articles Security Awareness Children disclosure Saf

Cyber Monday Mythbusting

It’s Cyber Monday, and marketing companies expect online shoppers to flock to websites and apps in order to take advantage of holiday sales. And naturally, this causes concerns about what kind of risks people are taking when they shop online. But F-Secure Security Advisor Sean Sullivan says any security warnings focusing on Cyber Monday are simply part
Publish At:2015-11-30 16:45 | Read:2807 | Comments:0 | Tags:Online Threats Security crime criminal F-Secure F-Secure Lab

POLL: Do you use two-factor authentication?

October is National Cyber Security Awareness Month in the US, and European Cyber Security Month in Europe. Basically, institutions in these two countries have decided that it’s time for people to get serious about cybersecurity. And they’re right to do it – according to F-Secure’s Business Security Insider blog, there was 81 cyberattacks every minute in 2014
Publish At:2015-10-13 15:00 | Read:3011 | Comments:0 | Tags:Security F-Secure Internet password protection safety securi

Very Soon, Swipes will be Out and Inserts will be In

On October 1, retailers across the United States are expected to fully implement EMV payment cards or smart cards and the technology used to authenticate them. This means that American customers will now be using debit and credit cards with computer chips on them—a technology that is commonly used in Europe, the U.K., and some Asian countries. This nationwid
Publish At:2015-09-15 03:10 | Read:3784 | Comments:0 | Tags:Security Threat bank credit card safety secure

Why Hackers and Viruses Love Multitaskers

This is the sixth in a series of posts about Cyber Defense that happened to real people in real life, costing very real money. Chris, a very ordinary businessman, was on a very ordinary business trip when he received an urgent call from one of his business partners asking him to make a money transfer. Chris was waiting for a train at a station, but he was h
Publish At:2015-08-20 11:50 | Read:3560 | Comments:0 | Tags:Business Security antivirus crime F-Secure Internet malware

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud