• All
  • Development
  • Security

Leaving employees to manage their own password security is a mistake

Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the problem.   How do you manage password security? More than half of IT executives surveyed rely on employees alone to monitor their own […]

How a missing smiley foiled a $70,000 email fraud

When hackers broke into the email account of a New Zealand grape-grower with the intent of stealing NZD $90,000 (approximately US $70,000) their plan came so very close to fruition. As Stuff New Zealand reports, it was only because of the careful eye of Kathryn Walker, the general manager of […]

Best Plugin to Clone/Duplicate a WordPress Website

Whether you need to migrate a client project from a local development site or you’re just tired of your web host’s slow service and awful support, there are many reasons why you might need to migrate a WordPress site to a new host. In any case, it’s crucial that the […]

Internet Explorer Bug Leaks What Users Type in the URL Address Bar

Microsoft’s Internet Explorer browser is affected by a serious bug that allows rogue sites to detect what the user is typing in his URL address bar. This includes new URLs where the user might be navigating to, but also search terms that IE automatically handles via a Bing search. Users […]

An Elaborate ATM Threat Crops Up: Network-based ATM Malware Attacks

Infecting automated teller machines (ATMs) with malware is nothing new. It’s concerning, yes. But new? Not really. We’ve been seeing physical attacks against ATMs since 2009. By physical, we mean opening the target machine’s casing, accessing the motherboard and connecting USB drives or CD-ROMs in order to infect the operating […]

CBS Showtime website was spotted mining cryptocurrency in viewers’ web browsers

Over the weekend, the websites of the CBS’s Showtime were found containing a JavaScript code that allowed someone to secretly mine cryptocurrency in viewers’ web browsers. The websites Showtime.com and iShowtimeAnytime.com silently injected in the visitors’ browser the code to abuse processor capabilities to mine Monero coins. The hidden code […]

Dirty Cow vulnerability discovered in Android malware campaign for the first time

For the first time, threat actors have added the Dirty Cow Android exploit to malware designed to compromise devices running on the mobile platform. On Monday, researchers from Trend Micro said the vulnerability, traced as CVE-2016-5195, has been discovered in a malware sample of ZNIU — detected as AndroidOS_ZNIU — […]

Cloud services: What to consider when migrating your infrastructure

I can barely remember the last time I installed a physical server at a company. These days, most companies have switched the majority of their services and information over to cloud services. There are many reasons for this, ranging from cost to practicalities — like trying to avoid buying hardware […]

Passwords to Over a Half Million Car Tracking Devices Leaked Online

We’ve seen a lot of data breaches this year: some big, some small, some that are dangerous, and some that are just embarrassing. But if we were to name one as the creepiest data breach of 2017, this leak of logins for car tracking devices might take the cake. The […]

CoinDash ICO Hacker Returns 10,000 Ether Without Any Demands

The CoinDash project attracted a lot of attention during its ICO. Establishing a new type of trading platform will not be easy, but the team feels they can pull it off. Unfortunately, their ICO was hit by a major theft of coins, which saw an unknown assailant steal 44,000 ETH. […]

Get the DOMAIN name you always wanted

Stand by To get the latest news

Cost Effective Web Hosting Plans

The Best VPS experience You Can Get

Get Your Hosting Today