Can Your Domains Get Hijacked?
Imagine this scenario: your customer service line gets a call from the owner of a small business whose e-commerce website is hosted through your service. The owner is in a…
Can Your Domains Get Hijacked?
Imagine this scenario: your customer service line gets a call from the owner of a small business whose e-commerce website is hosted through your service. The owner is in a…
The Recent Cyber War: Who Won, Who Lost, and What Lessons Did We Learn?
The impact of inexpensive IT networking systems has made cyberwarfare capabilities relatively cheap initiatives compared to pursuing nuclear weapons. For instance, North Korean hackers are chosen from universities and begin…
2014 Hacker Attacks: There Were More Than You Know
While the world was in an uproar about the alleged North Korea hack on Sony Pictures, many other organizations were compromised as a result of loopholes and deficiencies in their…
How Would an Email Outage Affect the Web?
Have you ever been at work when your email communication goes out? Do you ever hear people around the office who say that since email is down they might as…
The Top 8 Web Security Falsehoods and Blunders
These days, many web security experts say that there are only two types of businesses left in America: those that have experienced a breach and those that don’t know they…
Is ISIS a Threat to World Web Security?
In response to the air strikes and military presence brought about by the United States, the FBI has issued a warning that ISIS and other extremist groups may initiate cyber…
Top Data Breaches of 2014 and What We Have Learned
Data security is an increasingly common concern thanks to the rising awareness that security breaches pose very real threats to individuals. Companies have long been aware of the cost that…
Will the World’s Problems Affect the Internet?
The internet is one of the most powerful tools that we have at our disposal, but in the wrong hands that tool can easily become a weapon. While you may…
Taking a Behavioral-based Approach to DDoS Security
As the proliferation of online data has grown, so too has the need for companies to develop massive and complex virtual infrastructures in order to support their online traffic. These…
This will be the question of our decade. Swartz’s father claims the government killed him. Many journalists assert Swartz’s brain chemistry and circumstances killed him… Baloney. Certainly his depression, added…