October 6, 2017

Leaving employees to manage their own password security is a mistake

Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the problem.   How do you manage password security? More than half of IT executives surveyed rely on employees alone to monitor their own […]
October 5, 2017

How a missing smiley foiled a $70,000 email fraud

When hackers broke into the email account of a New Zealand grape-grower with the intent of stealing NZD $90,000 (approximately US $70,000) their plan came so very close to fruition. As Stuff New Zealand reports, it was only because of the careful eye of Kathryn Walker, the general manager of […]
October 5, 2017
Best Plugin to Clone/Duplicate a WordPress Website

Best Plugin to Clone/Duplicate a WordPress Website

Whether you need to migrate a client project from a local development site or you’re just tired of your web host’s slow service and awful support, there are many reasons why you might need to migrate a WordPress site to a new host. In any case, it’s crucial that the […]
September 27, 2017

Internet Explorer Bug Leaks What Users Type in the URL Address Bar

Microsoft’s Internet Explorer browser is affected by a serious bug that allows rogue sites to detect what the user is typing in his URL address bar. This includes new URLs where the user might be navigating to, but also search terms that IE automatically handles via a Bing search. Users […]
September 26, 2017

An Elaborate ATM Threat Crops Up: Network-based ATM Malware Attacks

Infecting automated teller machines (ATMs) with malware is nothing new. It’s concerning, yes. But new? Not really. We’ve been seeing physical attacks against ATMs since 2009. By physical, we mean opening the target machine’s casing, accessing the motherboard and connecting USB drives or CD-ROMs in order to infect the operating […]
September 26, 2017

CBS Showtime website was spotted mining cryptocurrency in viewers’ web browsers

Over the weekend, the websites of the CBS’s Showtime were found containing a JavaScript code that allowed someone to secretly mine cryptocurrency in viewers’ web browsers. The websites Showtime.com and iShowtimeAnytime.com silently injected in the visitors’ browser the code to abuse processor capabilities to mine Monero coins. The hidden code […]
September 26, 2017

Dirty Cow vulnerability discovered in Android malware campaign for the first time

For the first time, threat actors have added the Dirty Cow Android exploit to malware designed to compromise devices running on the mobile platform. On Monday, researchers from Trend Micro said the vulnerability, traced as CVE-2016-5195, has been discovered in a malware sample of ZNIU — detected as AndroidOS_ZNIU — […]
September 22, 2017

Cloud services: What to consider when migrating your infrastructure

I can barely remember the last time I installed a physical server at a company. These days, most companies have switched the majority of their services and information over to cloud services. There are many reasons for this, ranging from cost to practicalities — like trying to avoid buying hardware […]
September 21, 2017

Passwords to Over a Half Million Car Tracking Devices Leaked Online

We’ve seen a lot of data breaches this year: some big, some small, some that are dangerous, and some that are just embarrassing. But if we were to name one as the creepiest data breach of 2017, this leak of logins for car tracking devices might take the cake. The […]
Get Your Hosting Today