HackDig : Dig high-quality web security articles for hacker

Don’t Be Catfished: Protecting Yourself From New Account Fraud

Catfishing, the practice of pretending to be someone else online, became a cultural phenomenon through MTV’s popular TV show “Catfish,” driving more attention to our obsession with our online personas. However, it’s not just social media that needs additional scrutiny. In the wake of several recent major data breaches of personally id
Publish At:2017-11-01 00:20 | Read:395 | Comments:0 | Tags:Fraud Protection Identity & Access Fraud Fraud Detection Fra

Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge

Even as the technology deployed by both cyberattackers and cybersecurity defenders grows more sophisticated and powerful, the central role of the human factor remains critical. The most effective way to break into a computer network is to trick a legitimate user into opening the door to let you in. The techniques used to achieve this trickery are known as so
Publish At:2017-10-22 05:00 | Read:222 | Comments:0 | Tags:Fraud Protection Fraud Prevention Phishing Phishing Attacks

H1 2017 – Twitter suspended a total of 935,897 accounts for the promotion of terrorism

Twitter published its Transparency Report related to H1 2017, the company suspended 935,897 accounts for the promotion of terrorism. Twitter suspends 299,000 accounts linked to terrorism in the first six months of 2017, the company revealed that 75 percent of the infringing accounts were suspended before their first tweet confirming the huge efforts in fight
Publish At:2017-09-21 20:20 | Read:264 | Comments:0 | Tags:Breaking News Reports Social Networks Terrorism propaganda s

Facebook Telepathy Texting – Could It Be Hacked?

Is telepathy texting the next step in technology communications? With over 2 billion registered members, Facebook is the world’s most popular online service. But to maintain that title, Facebook is constantly developing new services to keep people logging in. In a recent video conference, Facebook chief Mark Zuckerberg discussed one of the cutting edge proje
Publish At:2017-08-25 06:35 | Read:515 | Comments:0 | Tags:Mobile Security News Social Media Facebook social media tech

Do you suffer from FOBO?

How long are you able to stay offline? Modern life is increasingly dependent on the Internet. We manage our finances, do our shopping and communicate with friends and family online. And when we’re not sitting at a desk working on a PC, we’re glued to our smartphones and tablets. As we spend more time online, the more important connectivity becomes to our liv
Publish At:2017-08-10 13:05 | Read:348 | Comments:0 | Tags:Mobile News Social Media FOBO social media WiFi networks

Telegram agrees to register in Russia, but it will not share private data

Telegram agrees to register with Russia authorities to avoid the local ban, but the battle is still ongoing because it won’t share user data. The Russian Government threatened to ban Telegram because it refused to comply data protection laws. “There is one demand, and it is simple: to fill in a form with information on the company that controls T
Publish At:2017-07-03 06:30 | Read:523 | Comments:0 | Tags:Breaking News Digital ID Hacking Laws and regulations ISIS p

Russian Gov is threatening to ban Telegram because it refused to comply data protection laws

Russia threatens to ban the Telegram instant messaging app because the company refused to be compliant with the country’s new data protection laws. The Russian Government is threatening to ban the popular Telegram instant messaging app because the company refused to be compliant with the country’s new data protection laws. Telegram has 6 million
Publish At:2017-06-27 03:10 | Read:419 | Comments:0 | Tags:Breaking News Intelligence Terrorism ISIS propaganda secure

Al-Jazeera claims to be facing a large-scale cyber attack due to Qatar crisis

Al-Jazeera claims to be the victim of a large-scale cyber attack as Qatar crisis continues. The attack comes after the hack of the state news service. The Qatar-based broadcaster Al-Jazeera announced all its systems were under a large-scale cyber attack. The news was spread in a statement released on social media by the broadcaster. Media reported that some
Publish At:2017-06-09 11:35 | Read:815 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Al Jazeera Doha Gulf cri

Five Tips to Stay Safe on Social Media While Traveling

Oversharing your travel plans can put you, your colleagues, your corporate data systems, your property and even your loved ones at risk. Similarly, announcing to the world that your home is vacant obviously increases the odds of a break-in, so what happens to your corporate laptop or personal devices containing corporate data that you leave at home? Furthe
Publish At:2017-06-07 21:40 | Read:778 | Comments:0 | Tags:Risk Management Identity Theft Phishing Security Awareness S

Qatar hack – Saudi Arabia, UAE, Egypt and Bahrain cut ties to the country

Recent Qatar hack is sparking diplomatic tensions in the Gulf, Saudi Arabia, the United Arab Emirates, Egypt and Bahrain cut ties to the country. Saudi Arabia, the United Arab Emirates, Egypt and Bahrain say they want to interrupt any diplomatic relation with Qatar. According to Al Jazeera, the Saudi kingdom made the announcement via its state-run Saudi Pres
Publish At:2017-06-05 15:20 | Read:603 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence Doha Gulf c

Information Security in the Age of Disinformation

Depending on their specific goals and motivations, malicious external actors seek to blackmail individuals, organizations or security vendors to disrupt breach defenses or otherwise wreak havoc on IT operations. For security leaders tasked with defending against these threats, it’s hard to know who or what to believe. That challenge has only gotten wor
Publish At:2017-06-03 00:15 | Read:637 | Comments:0 | Tags:CISO Data Protection Chief Information Security Officer (CIS

Is it dangerous to share your location on the internet?

Look at the apps installed on your smartphone and you’ll see that many of them offer location sharing functions. Location sharing is incredibly useful – when used correctly. Here are a few things you should be aware of “Check-ins” and strangers Apps like Foursquare and Swarm encourage users to “check-in” when visiting restaurants, bars and other places of in
Publish At:2017-06-02 16:40 | Read:753 | Comments:0 | Tags:Mobile Security Social Media cybersecurity social media tips

Qatar news agency hacked, attackers posted fake news

Qatar announced it had begun an inquiry into a security breach by hackers who published fake news that created tensions with the neighbor states. Qatar faced an unprecedented security breach, unknown attackers posted fake news stories attributed to its ruler on highly sensitive regional political issues. The hackers hit the Qatar official news agency websit
Publish At:2017-05-24 20:15 | Read:600 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Social Networks Doha Qat

Is Youtube Safe For Kids?

It can be surprising for parents that someone like Pewdie Pie has a net worth of millions of dollars, or that watching someone else play videogames is a billion dollar business thanks to streaming companies like Youtube. The types of videos that young children gravitate towards often surprise us, as the trends are constantly changing. To avoid any nasty shoc
Publish At:2017-05-19 02:30 | Read:675 | Comments:0 | Tags:Family Safety Mobile News Antivirus cybersecurity social med

Simple Ways To Make Your Twitter Safer

Anyone can fall victim to a twitter hack. “I hope the new world order will arrive as soon as possible!” – Britney Spears 2011 It used to be easy to quote literature and big names in a credible way. You’d pick out a book with an author’s name on the cover and you could use the author’s words without fear of ridiculously misquoting anyone. Wi
Publish At:2017-05-13 17:35 | Read:797 | Comments:0 | Tags:Mobile News Social Media cybersecurity social media tips Twi

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud