HackDig : Dig high-quality web security articles for hacker

The apparent difficulty of implementing email encryption in Gmail

It’s been almost three years since Google first announced its intention to add end-to-end encryption to Gmail. However, the free email service is yet to provide users with that feature. Despite the Internet giant insists that it was never a bluff, one of the company’s latest movements has reignited the criticism. Recently, a spokesperson from Goo
Publish At:2017-06-14 11:50 | Read:248 | Comments:0 | Tags:Security end-to-end encryption Gmail Google Privacy technolo

How to build a safe smart home?

Building a smart home is not hard at all… Coming home to a pre-heated house, being able always to monitor what is going on at home, knowing that if the emergency alarm sets you will not only get a notification on your cell so you can inform the authorities, but you will have a device that will start recording everything that is going on. It all sounds
Publish At:2017-06-13 17:25 | Read:163 | Comments:0 | Tags:Mobile News Technology cybersecurity IoT

Keyloggers: Be careful what you type

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking t
Publish At:2017-06-09 21:20 | Read:259 | Comments:0 | Tags:Security companies cyberattacks keyloggers technology

Can someone hack my drone?

Drones are gaining more and more popularity here in the US. They are no longer only a military tool able to operate thousands of miles away from us, but an easily accessible product available in almost every consumer electronics store in the US. Well, most of the ones sold in the stores may not be as powerful as the military ones, but they still are flying d
Publish At:2017-05-31 09:15 | Read:284 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

The US Cyberwarfare Campaign Against North Korea’s Nuclear Program

North Korea launched this weekend another medium- range missile in just over a week of the previous test, this time with success. The beef between the North Korean regime and the US is so thick, you’d need to slow roast it for the better part of a day just to get it tender. The two world powers find themselves in a political game of chicken once again as Ki
Publish At:2017-05-24 11:35 | Read:282 | Comments:0 | Tags:Security cyberwarfare Malware technology

AV-Comparatives awards the highest certification to Panda Security in protection against malware

The AV-Comparatives independent laboratory has awarded its highest level of certification, Advanced+, to the detection, scanning and protection effort of Panda Security. In a comparative review of more than 20 free and paid security software developers, the high detection capabilities of Panda Security’s solutions stood out. Panda detected 99.98% of the more
Publish At:2017-05-04 18:20 | Read:202 | Comments:0 | Tags:Mobile News Panda Security AV Comparatives Malware news secu

Pentagon: The Next Major War Will Be Fought with Cyberweapons

  The alleged hacking of the last US elections by the Russian government, the anonymous cyberattack that hit the Ukrainian power grid in 2015, the Stuxnet virus that sabotaged the Iranian nuclear program in 2010 — such events serve as a reminder that the next form of international conflict will be heavily dependent on cyberweapons. William Roper, direct
Publish At:2017-04-25 23:10 | Read:321 | Comments:0 | Tags:Technology cyberespionage cyberwarfare

Creepy? Maybe, but Employee Monitoring is Saving Companies Money

The practice of employee monitoring in the workplace has been evolving and is increasingly present in companies. As of this writing, 15% of companies on the prestigious Fortune 500 list have equipped their offices with tiny sensors created by the company Enlighted, which are used to find out how much time a worker spends at his or her desk, and also the time
Publish At:2017-03-28 18:15 | Read:485 | Comments:0 | Tags:Technology businesses employee monitoring savings

Mobile World Congress 2017: Are Future Technologies Safe?

“Technology is very hard to predict.” So said Reed Hastings, Netflix CEO, during his keynote at this year’s Mobile World Congress when asked what his forecast was for future technologies over the next five to twenty years. This year’s Mobile World Congress (MWC) was full of tech that gets us excited about the future though. From 5G, which could b
Publish At:2017-03-10 23:00 | Read:436 | Comments:0 | Tags:Mobile Security Technology cybersecurity Hackers IoT

Your Virtual Assistant Knows Quite a Lot about You

http://www.pandasecurity.com/mediacenter/src/uploads/2017/02/google-home-3-100x100.jpg“OK, Google.” With this simple voice command, the Google Home smart speaker sprung to life in a recent Super Bowl ad for Mountain View’s virtual assistant. To the surprise of many viewers, so did the Google Home in their own living room. OK, indeed. Just one more reminder t
Publish At:2017-02-22 12:50 | Read:537 | Comments:0 | Tags:Technology echo google home virtual assistants

How to Hide Information with Ordinary Office Printers

The printer you have in your office may be less innocent than you thought. Some experts have already shown that they can even become a steganographic tool, the art, well-known in computer security, of hiding information from prying eyes. A few years ago, the Electronic Frontier Foundation, an organization that defends civil liberties on the internet, reporte
Publish At:2017-01-26 15:35 | Read:539 | Comments:0 | Tags:Technology printers security steganography

What You Need To Know About The iMessage Security Flaw

With everything that’s gone down in 2016 it’s easy to forget Tim Cook’s and Apple’s battle with the FBI over data encryption laws. Apple took a strong stance though, and other tech giants followed suite leading to a victory of sorts for (the little guy in) online privacy. In this era of web exposure, it was a step in the right direction for those who feel ou
Publish At:2017-01-20 12:10 | Read:667 | Comments:0 | Tags:Technology Apple cybersecurity iPhone Mac

Just How Much Home Security Do You Need Right Now?

When it comes to home security, technology provides us with plenty of solutions for all needs and budgets. The problem is the same technology also provides burglars and perpetrators with the similar means of bypassing your fancy security systems. Long gone are the days when burglars would brutally force their way into your home with a lever. Now they can dis
Publish At:2016-12-12 05:05 | Read:815 | Comments:0 | Tags:Featured Articles Internet of Things Cyber home security IoT

Physical Backdoor | Remote Root Vulnerability in HID Door Controllers

If you’ve ever been inside an airport, university campus, hospital, government complex, or office building, you’ve probably seen one of HID’s brand of card readers standing guard over a restricted area. HID is one of the world’s largest manufacturers of access control systems and has become a ubiquitous part of many large companies’ physical security postur
Publish At:2016-11-20 03:20 | Read:1182 | Comments:0 | Tags:Critical Infrastructures Cyber Security ICS Physical Securit

Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock Doors and Set Off Fire Alarms

  A smoke detector that sends you a text alert when your house is on fire seems like a good idea. An internet-connected door lock with a PIN that can be programmed from your smartphone sounds convenient, too. But when a piece of malware can trigger that fire alarm at four in the morning or unlock your front door for a stranger, your “smart home” sud
Publish At:2016-11-20 03:20 | Read:1017 | Comments:0 | Tags:Cyber Security Cyber Security Research IoT Physical Security


Share high-quality web security related articles with you:)


Tag Cloud