HackDig : Dig high-quality web security articles for hacker

How safe are public USB charging stations?

Back in November, the Los Angeles District Attorney’s Office distributed an advisory about a new way criminal use public USB chargers to steal data called ‘juice jacking.’ The Los Angeles District Attorney pointed out that travelers must be cautious when using public USB power charging stations. According to government officials, charging a
Publish At:2019-12-04 10:35 | Read:96 | Comments:0 | Tags:Mobile News Security cybersecurity tips

What are the signs of video game addiction in children?

In the past, it was not easy for parents to get children back home after a long day of playing outside. The little ones enjoyed the outdoors so much that they didn’t want the day to end. Such behavior kept creating a challenge for parents who wanted them back home. In the last decade, things have changed, and the outdoor activities were replaced by spending
Publish At:2019-11-11 22:35 | Read:168 | Comments:0 | Tags:Family Safety Mobile News Parental Control tips

Halloween Cybersecurity Horror Stories 2019

Horror stories are an important tradition – and it turns out the world of cybersecurity has plenty to tell. Here are three genuine bone-chillers. The zombie phone outbreak With more than 1.5 billion users every month, WhatsApp is by far the world’s most popular messaging service. Available on Android, iOS and other mobile devices, the app connects people acr
Publish At:2019-10-25 04:15 | Read:423 | Comments:0 | Tags:Mobile News News Security cybersecurity tips

How to respond to cybercriminals?

Most of the cyber criminals are money-driven, so their main goal is to put their hands on your hard-earned money somehow. They can do it in various ways such as; by locking your system with ransomware and asking for a ransom; by obtaining sensitive materials so they can try to blackmail their way to your money; or they may decide to steal your login details
Publish At:2019-10-14 10:35 | Read:355 | Comments:0 | Tags:Mobile News Security Tips Cybercrime cybersecurity Ransomwar

Cyber security and sustainability – being a better global citizen

The impact of human activity on the environment is becoming clearer every day – and it’s obvious that we face some significant challenges in the near future. Climate change is now a headline issue and we’re all being urged to do our bit by reducing carbon emissions. It’s no surprise then that most people think of ‘sustainability’ in terms of environmental is
Publish At:2019-10-09 10:35 | Read:310 | Comments:0 | Tags:Mobile News Technology Tips

Smart camera privacy – what you need to know

As the cost of smart home technology falls, more of us are installing internet connected devices. Smart plugs, smart speakers, smart lights and now smart cameras, all designed to make our lives slightly easier. Smart cameras are increasingly popular. They allow us to check in on our sleeping babies, our elderly relatives or our pets. We can see who’s at the
Publish At:2019-09-26 10:35 | Read:371 | Comments:0 | Tags:Mobile News Technology Tips cybersecurity Smart camera

3 Ways to Minimize “Security Fatigue” Among Employees

There’s a side effect to our rising awareness of (and concern over) cybersecurity. It’s called “security fatigue”, and employees the world over are beginning to show symptoms of it. According to a study from the National Institute of Standards and Technology (NIST), the majority of internet users suffer from this so-called security fatigue. Users find themse
Publish At:2017-09-20 17:15 | Read:3131 | Comments:0 | Tags:Tips b2b security fatigue tips

Post-vacation cybersecurity tuneup: Get your company ready!

It’s that time of the year when most of us return to the stress of our jobs after having enjoyed a well-deserved summer vacation. But, if getting over the post-vacation blues is hard for anyone, for the members of the IT team it is a real nightmare: out-of-date computers, new software vulnerabilities, systems that do not work, organizational changes
Publish At:2017-09-13 19:10 | Read:2635 | Comments:0 | Tags:Adaptive Defense advanced cybersecurity b2b tips

Cyber Security Tips for Parents and Children

How to protect your children from cyber threats The summer just gracefully glanced over our lives, and now it is time for things to get back to normal – we will soon start feeling the cold breeze and the days will become shorter. Even though that the good old days of casual dress code in the office are now gone, being back to reality has some positives too.
Publish At:2017-09-05 17:15 | Read:8448 | Comments:0 | Tags:Mobile News Tips cybersecurity passwords Privacy

Back to School with Cybersecurity on our Minds

The multitude of devices that have entered our lives over the past decade have also entered the classroom, and the security issues we face every day are just as real in the school as they are in our homes or businesses. Tablets, computers, even smartwatches can be useful educational tools, but the personal data that they store, belonging to students and teac
Publish At:2017-09-01 20:50 | Read:2707 | Comments:0 | Tags:Tips b2b back to school cybersecurity

Are All Hackers Bad? 7 Types of Hackers

Top Seven Types of Hackers You hear about leaks and hacks on a daily basis, but most of the times the identity of the people involved in these events remain hidden from the society. Every time there is a cyber-incident, the media releases a lot of information about the damages, but you rarely get much about the hackers themselves. Sometimes names of a myster
Publish At:2017-08-30 12:35 | Read:3273 | Comments:0 | Tags:Mobile News News Security Hackers Malware tips

Are we “cyber safer” than ever?

After all recent attacks, what is the current cybersecurity status? 2017 has already seen a number of high profile cybersecurity events, and we expect many more before the year is out. As an evidence of this, PandaLabs records a 40% increase in attacked devices this quarter. Cybercriminals have been carrying out attacks on an unprecedented scale, even bringi
Publish At:2017-08-04 12:35 | Read:3778 | Comments:0 | Tags:Mobile News Security cybersecurity security tips

Hotel hijacking: Are your bookings at risk?

What to keep in mind when booking your next trip? Planning your next trip has never been easier. You just go online, browse around until you find a price that works for you, and book your flights, room, and rent-a-car. Once it is all done, you save all your reservations, and you truly believe you are all set for the next big adventure in your life! You see t
Publish At:2017-08-03 17:45 | Read:2737 | Comments:0 | Tags:Mobile News Security cybersecurity hotels tips

Cybersecurity Tips for Small and Medium-sized Businesses

When it comes to ransomware, big businesses get all the attention in the press, which might lead one to think that this kind of cyberattack only targets companies with a big name. But this is far from the truth. On a global level, 43% of attacks are aimed at small and medium-sized businesses (SMBs). In fact, as we’ve recently seen in PandaLabs’ quarterly rep
Publish At:2017-08-03 17:45 | Read:2843 | Comments:0 | Tags:Security b2b SMBs tips

Mistakes to avoid when choosing an app

Risks of downloading apps The snappy catchphrase “there’s an app for that” is true – there really is a smartphone app for almost every task you can think of. There’s a virtual cow milking simulator, a carpet cost calculator and a tool for counting how many beers you have drunk for instance. But next time you are looking for an app that’s a little unusual, th
Publish At:2017-07-07 12:20 | Read:2771 | Comments:0 | Tags:Mobile News Mobile Security Panda Mobile Security tips


Share high-quality web security related articles with you:)


Tag Cloud