HackDig : Dig high-quality web security articles for hacker

TikTok Explained to a Millennial

The chances that you have heard of apps such as TikTok and Byte are high, but the likeliness of you having one of those apps on your phone are pretty slim unless you were born after 1997. Over the last couple of years, TikTok has been causing a real stir among teenagers making the app the second most downloaded app in the world for 2019. With more than a bil
Publish At:2020-02-20 05:31 | Read:191 | Comments:0 | Tags:Mobile News Social Media apps TikTok

X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

The volume of threats that security teams see on a daily basis can make it especially difficult to look at the big picture when it comes to developing an effective cybersecurity strategy. To see through the flood of data and alerts, organizations depend on actionable threat intelligence to help them understand and mitigate risks. Looking at long-term trends
Publish At:2020-02-11 08:51 | Read:261 | Comments:0 | Tags:Advanced Threats Threat Intelligence Cloud Cloud Adoption Cl

Facebook knows a lot about your online habits – here’s how to stop it

byDanny BradburyFacebook is rolling out a global tool to help you understand what other sites and apps tell it about your activities, to make it forget what they’ve shared in the past, and to control what they share in the future. It’s called Off-Facebook Activity, and it’s part of the company’s effort to appear more privacy-friendly
Publish At:2020-01-30 12:35 | Read:284 | Comments:0 | Tags:Facebook Privacy Social networks off facebook activity onlin

Why You Should Take Social Media Account Takeover as Seriously as a BEC Attack

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Social%20BEC.png?width=300&amp;name=Social%20BEC.png" alt="Social BEC" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">Social media account compromise is nothing new. If you haven’t had an account hacked in the past, most of us know someone who has. According to a
Publish At:2020-01-24 10:40 | Read:285 | Comments:0 | Tags:social media Digital Risk Protection

New Webinar: Inside the World of Social Media Phishing: Financial Scams

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/SM%20Phishing%20Webinar%20(2).png?width=300&amp;name=SM%20Phishing%20Webinar%20(2).png" alt="SM Phishing Webinar (2)" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;"></p> <p>On a daily basis, most people will use some form of social media. From checki
Publish At:2020-01-14 16:20 | Read:259 | Comments:0 | Tags:Phishing social media Digital Risk Protection

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

This post was co-authored by Wendy Zamora and Chris Boyd. All opinions expressed belong to your mom. Back in the days before climate change stretched frigid winter months directly into the insta-sweat of summer, there was a saying about March: in like a lamb, out like a lion. The same might be said about the last decade in cybersecurity fails. What kic
Publish At:2019-12-19 16:50 | Read:360 | Comments:0 | Tags:Awareness ashley madison ashley madison hack BadRabbit cambr

How to Handle Brand Impersonation on Social Media

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Social%20Media%20Phish%20Brand%20Impersonation.png?width=300&amp;name=Social%20Media%20Phish%20Brand%20Impersonation.png" alt="Social Media Phish Brand Impersonation" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;"></p> <p>Social media is undoubtedly
Publish At:2019-12-19 16:15 | Read:526 | Comments:0 | Tags:social media

Could Your Child be Sexting? Signs to Look for and Ways to Respond

Oh, what we wouldn’t do to travel back in time to the days before smartphones kid-jacked our families, right? But here we are. Our kids are forever connected. And, it’s up to parents to help them navigate the risks — one of which is sexting. Ouch. Even reading the word may make any parent want to click off this post and run. But don’t. Stay
Publish At:2019-12-06 16:45 | Read:581 | Comments:0 | Tags:Family Safety facebook social networking protecting kids onl

Why is Instagram getting rid of like counts?

Instagram started hiding the number of likes for some profiles located in multiple countries A few months ago, Instagram started hiding the number of likes for some profiles located in multiple countries around the world. Owners of the profiles were still able to see the number of likes they get, as well as the usernames of the people who have liked them. Ho
Publish At:2019-11-18 04:15 | Read:640 | Comments:0 | Tags:Mobile News Social Media

WhatsApp spyware is being used to curtail the freedom of the press in India

In most cases malware is associated with theft. From keyloggers that collect passwords and credit card details to sophisticated tools for breaking into secure company networks, malware has many uses – mostly for committing crime. However, a new use has emerged in recent months – citizen surveillance. Political activists and journalists under investigation Me
Publish At:2019-11-15 09:15 | Read:436 | Comments:0 | Tags:Mobile News News Social Media cyberattacks Cybercrime WhatsA

A week in security (November 4 – November 10)

Last week on Malwarebytes Labs, we announced the launch of Malwarebytes 4.0, tackled data privacy legislation, and explored some of the ways robocalls come gunning for your data and your money. We also laid out the steps involved in popular vendor email compromise attacks. Other cybersecurity news Bug bounty bonanza: Rockstar Games open up their bounty prog
Publish At:2019-11-11 23:20 | Read:640 | Comments:0 | Tags:A week in security awis cyber facebook fake news hacking Mob

Facebook scams: Bad ads, bogus grants, and fake tickets lurk on social media giant

We recently highlighted new steps Instagram is taking to try and clamp down on scammers sending fake messages on their platform. It turns out, other social media giants are walking a similar path for a variety of bogus ads and other attacks. Facebook scams in particular have taken off, despite the company’s efforts to stamp them out. Facebook is now ex
Publish At:2019-11-11 23:20 | Read:502 | Comments:0 | Tags:Scams advertising reporting tool cloned accounts concert tic

Twitter Says No to Political Advertising

It is not that often that we see a company offering social media networking services voluntarily cut down a portion of its major revenue generator – advertising. Earlier this week, Twitter’s CEO Jack Dorsey surprisingly announced that Twitter would no longer accept political advertising campaigns. In a series of Tweets sent from his official profile account
Publish At:2019-11-11 22:35 | Read:384 | Comments:0 | Tags:Mobile News News Social Media cybersecurity social media

How to protect yourself from doxing

“Abandon hope all ye who enter.” This ominous inscription affixed atop the gates to Hell in Dante’s Divine Comedy applies peculiarly well to describe the state of the Internet today. It’s hard to draw a parallel to the utility that the Internet has offered to modern civilization—perhaps no other technological innovation has brought about greater chan
Publish At:2019-10-25 16:50 | Read:618 | Comments:0 | Tags:How-tos dox doxer doxing IP address mobile VPNs online priva

Zuckerberg Roasted over Libra

Facebook’s CEO Mark Zuckerberg got roasted with questions about the company’s involvement in the new ambitious cryptocurrency project called Libra. Even though the hearing before Congress was predominantly about Libra, the members of Congress used this as an opportunity to ask questions for other topics that included the Cambridge Analytica scandal, the mult
Publish At:2019-10-25 04:15 | Read:756 | Comments:0 | Tags:Mobile News News Social Media cybersecurity Facebook


Share high-quality web security related articles with you:)


Tag Cloud