Network and Security

How to Win Over Linux Encoder Ransomware?

How to Win Over Linux Encoder Ransomware?

Ransomware is everywhere these days. No longer confined to computers, its attacking people’s phones and, via Android, is even holding smart TVs to ransom. And it’s also been attacking Linux servers. In this article, we’ll explain what ransomware is, how it infects Linux servers and what you can do to eradicate the Linux Encoder Ransomware …

Incoming search terms:

Keeping Your Website Safe and Secure

Keeping Your Website Safe and Secure

Did you know that 86 per cent of websites have at least one serious security flaw, the 2015 Website Security Statistics report suggests? Nearly 55 per cent of retail and healthcare sites are vulnerable all of the time. Depending on the manner in which it has been developed and the types of data that you …

Why Use SSL Certificates?

Why Use SSL Certificates?

There are many activities that use the confidential data on the Internet, reason that makes companies and individuals need SSL certificates to secure their transactions, and any other communication through the website. The Secure Socket Layer (SSL) is a protocol which ensures that the information is encrypted before being forwarded to another server so that …

Latest in Cyber Vulnerability – The FREAK Attack

Latest in Cyber Vulnerability – The FREAK Attack

It seems that the predictions made by tech journalists after a serious of attacks in 2014, are coming for real. According to them, the situation in 2015 would be worse viewing to the more advanced techniques been used to penetrate networks. This time it’s ‘the FREAK attack’. After DDoS that lead to Internet slowdown globally, …

Challenges to Cyber Security in 2015 – Know What We are Up Against

Challenges to Cyber Security in 2015 – Know What We are Up Against

  Considering the evidences from the past, in the retail sector even the robust players like Home Depot, Target, Sony, Staples and number of banks were victims to high-profile breaches. While we are referring to large organisations or reputed brands, it’s a misconception that small firms will always be safe and that the cyber criminals …

Dehaunting Linux, PHP & WordPress from the Ghost Bug

Dehaunting Linux, PHP & WordPress from the Ghost Bug

  Though all our Linux systems were patched the moment we came to know about the Linux Ghost Bug or the GetHost vulnerability, we would like to help you with information on what this vulnerability is all about. Did you know, Linux users were literally haunted by a ‘GHOST’? Yes, that’s right ‘Haunted’ by ‘GHOST’, …

Taming the POODLE (Padding Oracle On Downgraded Legacy Encryption) using TLS_FALLBACK_SCSV

Taming the POODLE (Padding Oracle On Downgraded Legacy Encryption) using TLS_FALLBACK_SCSV

  Poodle attack is an attack in which the eavesdropper/man in the middle (MITI) takes advantages of the recessive compatibility of the server and the client to fall back to SSL 3.0. If the attacker is able to manipulate the server to use the older version of SSL instead of TLS 1.0 and above, then …

Incoming search terms:

What is Cyber Crime? A Complete Guide: Includes The Latest Threats

What is Cyber Crime? A Complete Guide: Includes The Latest Threats

It is a crime in which the computer is used either as an instrument or target or may be used as both. Cybercrime includes any unlawful act dealing with computers and computer networks. Many crimes that are traditional in nature may also be conducted through the Internet. To list few of them are Internet fraud, …

Incoming search terms:

Your System and Downtime – How to keep it under Control?

Your System and Downtime – How to keep it under Control?

‘Downtime’, one word which is enough to run chills through the spines of IT managers AND website owners. But as a matter of fact, downtime can be categorized primarily into two components: Planned and Unplanned. Ideally, planned downtime is controlled and measures can be taken to get the system back online in a scheduled time. …

Pin It on Pinterest