- All
- Development
- Security
Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the problem. How do you manage password security? More than half of IT executives surveyed rely on employees alone to monitor their own […]
When hackers broke into the email account of a New Zealand grape-grower with the intent of stealing NZD $90,000 (approximately US $70,000) their plan came so very close to fruition. As Stuff New Zealand reports, it was only because of the careful eye of Kathryn Walker, the general manager of […]
Whether you need to migrate a client project from a local development site or you’re just tired of your web host’s slow service and awful support, there are many reasons why you might need to migrate a WordPress site to a new host. In any case, it’s crucial that the […]
Microsoft’s Internet Explorer browser is affected by a serious bug that allows rogue sites to detect what the user is typing in his URL address bar. This includes new URLs where the user might be navigating to, but also search terms that IE automatically handles via a Bing search. Users […]
Infecting automated teller machines (ATMs) with malware is nothing new. It’s concerning, yes. But new? Not really. We’ve been seeing physical attacks against ATMs since 2009. By physical, we mean opening the target machine’s casing, accessing the motherboard and connecting USB drives or CD-ROMs in order to infect the operating […]
Over the weekend, the websites of the CBS’s Showtime were found containing a JavaScript code that allowed someone to secretly mine cryptocurrency in viewers’ web browsers. The websites Showtime.com and iShowtimeAnytime.com silently injected in the visitors’ browser the code to abuse processor capabilities to mine Monero coins. The hidden code […]
For the first time, threat actors have added the Dirty Cow Android exploit to malware designed to compromise devices running on the mobile platform. On Monday, researchers from Trend Micro said the vulnerability, traced as CVE-2016-5195, has been discovered in a malware sample of ZNIU — detected as AndroidOS_ZNIU — […]
I can barely remember the last time I installed a physical server at a company. These days, most companies have switched the majority of their services and information over to cloud services. There are many reasons for this, ranging from cost to practicalities — like trying to avoid buying hardware […]
We’ve seen a lot of data breaches this year: some big, some small, some that are dangerous, and some that are just embarrassing. But if we were to name one as the creepiest data breach of 2017, this leak of logins for car tracking devices might take the cake. The […]
The CoinDash project attracted a lot of attention during its ICO. Establishing a new type of trading platform will not be easy, but the team feels they can pull it off. Unfortunately, their ICO was hit by a major theft of coins, which saw an unknown assailant steal 44,000 ETH. […]