HackDig : Dig high-quality web security articles for hackers

How to Color Calibrate Your Mac’s Display

If you only use your Mac for browsing the Web, sending and receiving email, and working in a word processor, it’s probably not all that important for it to display accurate colors. However, if you work with photos or videos, or even if you like to watch movies in the best possible conditions, color calibrating your display is essential.The calibration
Publish At:2020-11-27 12:02 | Read:89 | Comments:0 | Tags:How To Calibrate Color Mac photo video

Deepfakes and the 2020 United States election: missing in action?

If you believe reports in the news, impending deepfake disaster is headed our way in time for the 2020 United States election. Political intrigue, dubious clips, mischief and mayhem were all promised. We’ll need to be careful around clips of the President issuing statements about being at war, or politicians making defamatory statements. Everything is up for
Publish At:2020-10-16 14:11 | Read:255 | Comments:0 | Tags:Cybercrime Social engineering 2020 US election AI conspiracy

Naked Security Live – Cybersecurity tips for your own network

byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time. (Note that you don’t need a Facebook ac
Publish At:2020-10-12 11:24 | Read:278 | Comments:0 | Tags:Audio and Video Video CSAM Facebook Live Naked Security Live

Introducing VideoBytes, by Malwarebytes Labs

We have exciting news for avid readers of Malwarebytes Labs: This week, we’re launching a new, monthly video series that will feature the research, insights, and commentary of our own Adam Kujawa, security evangelist and a director for Malwarebytes Labs. Welcome to VideoBytes, our little corner of threat cinema on the web. The stories we’ll cover i
Publish At:2020-09-30 12:27 | Read:205 | Comments:0 | Tags:VideoBytes Explained malwarebytes labs please don't buy this

Naked Security Live – “The Zerologon hole: are you at risk?”

byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time.It’s usually about 18:00 UK time, which
Publish At:2020-09-30 10:45 | Read:186 | Comments:0 | Tags:Video Vulnerability Naked Security Live Zerologon security

Naked Security Live – “SMS scams: keep yourself and your family safe!”

byPaul DucklinWe do a show on Facebook every week in our Naked Security Live video series, where we discuss one of the big security concerns of the week.We’d love you to join in if you can – just keep an eye on the @NakedSecurity Twitter feed or check our Facebook page on Fridays to find out the time.It’s usually about 18:00 UK time, which
Publish At:2020-09-30 10:45 | Read:313 | Comments:0 | Tags:Phishing Video Naked Security Live phishing smishing SMS sec

Naked Security Live – “Should you worry about your wallpaper?”

byPaul DucklinDid you know that we do a show on Facebook every week in our Naked Security Live video series?We usually discuss one of the big security concerns of the week – from data breaches and corporate hacks to vulnerabilities and scare stories – in a way that not only explains what happened but also offers useful tips about how to stay safe
Publish At:2020-09-14 07:39 | Read:391 | Comments:0 | Tags:Video Naked Security Live security

How to Shoot Video with an iPhone

Shooting video with an iPhone is easy, but you may not know all the many options available on your device. You can choose the resolution and frame rate of your videos, shoot slow motion or time-lapse videos, and you can zoom and use the different lenses on your iPhone, if your model has multiple cameras. But you can also take stills while you’re shooti
Publish At:2020-05-24 08:19 | Read:517 | Comments:0 | Tags:How To iPhone video

WannaCry – and why it never went away

byPaul DucklinThe infamous ransomware worm WannaCry is already more than two-and-a-half years old.WannaCry spreads using a security hole that was patched two months before the worm first appeared, so you’d be forgiven for assuming that it would have fizzled out by now and become little more than a museum curiosity.But a paper published recently by Soph
Publish At:2019-09-23 05:45 | Read:1872 | Comments:0 | Tags:Video malware Naked Security Live ransomware WannaCry

Securing the Modern Endpoint the SANS Maturity Way

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around a modern threat risk model using few
Publish At:2017-10-30 17:15 | Read:5634 | Comments:0 | Tags:Threats case study data sheet defenses detection endpoint mo

We Love HP, Inc.’s Newest Episode of “The Wolf” [Video]

Last February, we announced our relationship with HP, Inc. HP Sure Click provides secure browsing on selected HP business laptops. Sure Click delivers Bromium’s the first step in virtualization-based security for secure browsing. HP, Inc. is committed to keep their customers safe from cyber crime. They have invested in creating a laptop strategy that
Publish At:2017-07-05 18:30 | Read:4886 | Comments:0 | Tags:Company News browsing Christian Slater cyber crime cybersecu

Disposable Computing is the Answer to Cyber Security for Business

Disposability has become a regular thing in our lives; but you may have taken for granted the value it brings. Cost, convenience and risk are the cornerstones of successful disposability. Disposable computing offers a solution to cyber security and provides you with valuable threat information. This is the first in our two-part series on disposable computi
Publish At:2017-06-21 04:35 | Read:4167 | Comments:0 | Tags:Innovation computing convenience cost disposable end users I

A closer look at a 3.0 cyber-attack

How does WannaCry work? The WannaCry global attack, which hit 200,000 computers in at least150 countries a few days ago, has set a milestone in the history of cyber-crime, and has made businesses of all types more aware of the importance of having a good cyber-security defense to avoid having their reputation and balance sheet compromised. Today’s atta
Publish At:2017-05-23 17:10 | Read:3667 | Comments:0 | Tags:Malware Mobile News adaptive defense cybersecurity PandaLabs

Netflix and Orange is the New Black Are Being Held for Ransom

Netflix has been asked to pay an unspecified amount in ransom. Un-aired episodes of the show, Orange is the New Black (OTNB) is the hostage. This time it’s personal: I wait months for the new season and I don’t want any spoilers. I met Jenji Kohan’s husband, Chris Noxon, years ago at a marketing conference where he was speaking about his
Publish At:2017-05-01 08:20 | Read:4266 | Comments:0 | Tags:Breaking News Hollywood Netflix News ransom Ransomware studi

Watch out! This iPhone-freezing video will CRASH any iPhone!

It has happened again, most of the Apple devices crashes when the owner plays this iPhone-freezing video. Be careful when clicking on suspicious links. A new bug  in iPhone is threatening Apple users, most of the Apple devices crashes when the owner plays a video. An iPhone-freezing video is circulating online, when users play it in the Safari browser the iP
Publish At:2016-11-23 20:10 | Read:5345 | Comments:0 | Tags:Breaking News Hacking Mobile iPhone mobile Video

Tools