The Great Hacking Heist of 2014
2014 seemed to be the year of the hack and whittling away at website capabilities. While some hacks can serve as a mere annoyance to web hosts and their clients,…
The Great Hacking Heist of 2014
2014 seemed to be the year of the hack and whittling away at website capabilities. While some hacks can serve as a mere annoyance to web hosts and their clients,…
The Top 9 Ways You Can Foil Hackers
The word “hacker” strikes fear in the heart of many businesses and web hosting companies, and rightfully so. Hackers have become a major threat to websites, causing downtime, launching viruses…
Will Web Hosting Companies Ever Be a Target of Cyber Attack?
With a slew of hackings and compromised customer information, cyber attacks have quickly come to the forefront of attention in the United States and around the world. With the human…
Is Your Server Secure? How Vulnerable Is Your Data to Hackers?
The recent Heartbleed bug brought pertinent security issues to light. Multiple security redundancies are not preferable when combating ransomware; they are necessary. Victims of ransomware such as Heartbleed have already…
Are Certain Countries a Threat to Web Security?
The concept of cyber warfare is not particularly new. However, numerous criminal organizations in foreign countries claim to work for, or obtain funding from, widely recognized government organizations. Cyber warfare…
This will be the question of our decade. Swartz’s father claims the government killed him. Many journalists assert Swartz’s brain chemistry and circumstances killed him… Baloney. Certainly his depression, added…
What the New User can Learn from the GoDaddy Account Hack
Recently a security breach occurred in 445 of GoDaddy’s web hosting accounts. While that may not seem like a lot on a percentage basis, that is also high enough to…
Keep Your Site Safe – Learn What Not to Do
Let’s face it: The Internet isn’t the golden playground it once was, where all could go and have their swing in peace. In fact, it’s now so overrun with bullies…
How And When To Offer SSH Access To Your Customers
If you’re running on a Unix or Linux server, then you likely access your files systems via SSH on a daily basis. However, this might be well and fine for…
How To Deal With A Possible Intruder On Your Server
You’re cruising through your server’s inner network one fine day, when all of a sudden you notice an unfamiliar name accessing your files. This user may have come through SSH,…
How to Keep Your Server Safe From Common Security Problems
It’s a wild, wild world out there. There’s all kinds of culprits just waiting to hack your website, trash all those gorgeous lines of code, and then steal your information…
Several Security Risks and How to Avoid Them
Yes, you’ve made sure that you’ve chosen a password that you can remember, that no one else can guess, and that has in it at least one number and one…