HackDig : Dig high-quality web security articles for hacker

[SANS ISC] Why Phishing Remains So Popular?

I published the following diary on isc.sans.edu: “Why Phishing Remains So Popular?“: Probably, some phishing emails get delivered into your mailbox every day and you ask yourself: “Why do they continue to spam us with so many emails? We are aware of phishing and it will not affect my organization!” First of all, emails remain a
Publish At:2020-01-24 15:20 | Read:126 | Comments:0 | Tags:SANS Internet Storm Center Security Social Engineering Phish

Tens of Thousands of Legal Cannabis Users from the USA Exposed in a Data Breach

A software company has accidentally exposed the details of approximately 30,000 legal weed customers. THSuite, an entity that specializes in developing software for marijuana dispensaries, ended up revealing the details of tens of thousands of American cannabis buyers. The data belonged to dispensaries, located in Maryland, Ohio, and Colorado. Even though so
Publish At:2020-01-24 09:15 | Read:146 | Comments:0 | Tags:Mobile News privacy data breach security

[SANS ISC] Complex Obfuscation VS Simple Trick

I published the following diary on isc.sans.edu: “Complex Obfuscation VS Simple Trick“: Today, I would like to make a comparison between two techniques applied to malicious code to try to bypass AV detection. The Emotet malware family does not need to be presented. Very active for years, new waves of attacks are always fired using different in
Publish At:2020-01-23 08:20 | Read:85 | Comments:0 | Tags:Malware SANS Internet Storm Center Security Emotet Maldoc Ob

Serious security breach in Internet Explorer: Microsoft warns against use

A critical vulnerability in Internet Explorer, with the identifier CVE-2020-0674 has been published by Microsoft. It allows attackers to remotely execute code using the JScript.dll library. A security patch is currently being created. On the first patch Tuesday of 2020, Microsoft released 49 updates; shortly afterwards, the vendor reported a new zero-day sec
Publish At:2020-01-21 09:15 | Read:226 | Comments:0 | Tags:News Security Germany Microsoft vulnerability

Grindr Records a Spike in Phishing Attempts

Over the last few days, Grindr’s customer support has been sending cybersecurity alerts to its user database. The warning addresses an ongoing spike in phishing attempts monitored by the company’s IT team. The phishing attempts come from fake profiles registered on the platform and emails. According to the alert, the phishing scam attempts consist mainly of
Publish At:2020-01-20 04:15 | Read:303 | Comments:0 | Tags:Mobile News Security grindr Phishing

Help?! Possible global hacker attack by Citrix vulnerability

Following another official vulnerability alert issued in the past 48 hours, which has been known since December, companies still protected from this new attack are continuously receiving new requests for help. CISA considers the vulnerability to be one of the most dangerous exploits of recent years. Potentially, some 80,000 companies worldwide are at risk. T
Publish At:2020-01-17 09:15 | Read:318 | Comments:0 | Tags:News Security business Exploit Germany vulnerability Vulnera

Travelex Hit By $6m Ransom Attack

Travelex, a global foreign exchange company with hundreds of stores across the USA alone, is being held hostage by hackers demanding $6 million ransom. The cybercriminals from a gang known as Sodinokibi and REvil, claim that they are in possession of approximately 5GB of what they say is very sensitive data. They claim the stolen data consists of national id
Publish At:2020-01-13 09:15 | Read:328 | Comments:0 | Tags:Mobile News Security Cybercrime Ransomware

US-Iran conflict shifted to the Cyber World

Iranian Hackers Launched Thousands of Cyber Attacks against the USA The tension between the USA and Iran significantly increased after the USA’s drone strike that eliminated Iran’s Gen. Qassem Soleimani. Iran promised to retaliate and launched a dozen unsuccessful missiles aiming at Iraqi bases housing U.S. troops. Iran rockets even landed in the Green Zone
Publish At:2020-01-09 09:15 | Read:324 | Comments:0 | Tags:Mobile News News Security cyberattacks

How to use your new phone at work (safely)

Did you get a new phone for Christmas? You’re not alone – smartphones are a popular gift each year. You’re probably also eager to use your new phone at work. You can send and receive work email, use Skype or WhatsApp to chat with your colleagues, and you can take calls any place any time. You’re a productivity powerhouse – if your boss agrees to
Publish At:2020-01-08 09:15 | Read:232 | Comments:0 | Tags:Mobile News Security smartphones tips

Les Banques En Ligne Sont-Elles Sûres ?

Depuis les années 2000 sont apparues les banques 100% en ligne. Elles sont des atouts indéniables et des millions de personnes les ont déjà adoptées. Cependant, il existe encore une réticence chez certaines personnes à confier leur argent à ce type d’établissement. Leurs craintes ? La solidité de ce type de banque et la sécurité sur internet. Alors, dans les
Publish At:2020-01-07 04:15 | Read:222 | Comments:0 | Tags:Mobile News Security banque cybersecurity

Your 2020 New Year Cybersecurity Resolutions

For many people, new year resolutions are an important opportunity for self-improvement. 38% of us promise to exercise more, 33% aim to lose weight and 32% want to eat more healthily. Almost all of the resolutions are health-related – but cybersecurity and IT health don’t make the list. Here are four cybersecurity new year resolutions everyone should be maki
Publish At:2020-01-03 09:15 | Read:391 | Comments:0 | Tags:Mobile News Security cybersecurity tips

Explained: edge computing

Edge computing may seem like a foreign and future-facing term. Yet its applications are widespread and diverse, with the ability to transform the way we store, use, and share data and programs online. The implications of edge computing are far-reaching, trickling down from software development and business applications to everyday computing—even to gameplay.
Publish At:2019-12-30 16:50 | Read:280 | Comments:0 | Tags:Explained cdn cloud edge computing latency security

UK’s Government’s Brexit App Is A Security Nightmare

The United Kingdom is finally set to leave the European Union on January 31st 2020. With just a matter of weeks until the deadline, people are still trying to find out exactly what will change – and what they need to do to prepare. This confusion is even more worrying for non-UK citizens living in Britain. Most will know that they are expected to apply for ‘
Publish At:2019-12-30 04:15 | Read:497 | Comments:0 | Tags:Mobile News Security brexit cybersecurity

Consumer Groups are Racing to Issue Security Warnings For Amazon Ring

Over the last few weeks, the media published stories about hacked Amazon Ring devices that allow hackers to get unauthorized access to consumer video monitoring devices such as Amazon Ring. One of the warnings recently issued from Fight For The Future stated that Amazon Ring cameras are not safe. The consumer group quoted a report from VICE saying that there
Publish At:2019-12-26 09:15 | Read:436 | Comments:0 | Tags:Mobile News Security passwords Privacy security

Hacked Gas Pumps Are on the Rise in the USA

Unless you live in New York or Chicago, the chances of you pumping gas on a regular basis are quite high – and the possibility of hackers stealing your credit card information might be high too, according to VISA. The California-based multinational financial services corporation company recently issued a security alert warning to the public. Its fraud detect
Publish At:2019-12-20 09:15 | Read:328 | Comments:0 | Tags:Mobile News Security Cybercrime Phishing


Share high-quality web security related articles with you:)


Tag Cloud