In this day and age, windows defender and a spam filter on your email account just isn’t going to cut it anymore. The landscape of cybersecurity breaches and vulnerabilities is constantly changing and to protect[…]
Category: Security and Vulnerabilities
Disabling SSLv3 for POODLE
Padding Oracle On Downgraded Legacy Encryption (POODLE) was released with the CVE identifier of CVE-2014-3566. This vulnerability was discovered in SSL 3.0. This is different to the “HeartBleed” vulnerability which was discovered in OpenSSL. SSL protocol[…]
What is GDPR Compliance And Why Do I Need to Do it?
As of the 25th Of May 2018, All businesses that have any data used to identify an individual MUST be GDPR Compliant. GDPR (The General Data Protection Regulation) is designed to harmonize data and privacy laws across[…]
Top 5 Tips for Cyber Security in Your Business
Cyber security is crucially important in this day and age and should not be taken lightly. With technological advancements being made every single day, you might find it difficult to counter against the countless vulnerabilities[…]
4.1 Million Exposed RDP Ports. The Welcoming Gateway To Hackers
Cybersecurity researchers are working around the clock to actively monitor any possible areas of attacks. One of the most common methods that we are using is port scanning of variable strength to see what threat[…]
How To Secure Your WordPress Site Against Common Threats
One of the most crucial aspects of your new (or old) wordpress sites is security. This article is written to help you understand the fundamentals of WordPress security, we aim to give you knowledge to[…]
Best Hosting Solutions For Startups
There are many different types of hosting out there that sometimes you might just get lost amongst all the different options! But do not fear, VMotion is here! For a startup business, you know well[…]
How To Protect Yourself From The WannaCry Ransomware Virus
How To Protect Yourself From WannaCry The ransomware attack is holding computers hostage all over the world. Here’s what you need to know about it to keep yourself as safe as possible. WannaCry attack started[…]
ShellShock vulnerability: Should you be concerned?
In the very short: Yes, update right now. If you want more details read below. What is ShellShock vulnerability? ShellShock is a nickname given to remote exploit vulnerability in bash CVE-2014-6271. It could allow[…]
Heartbleed Open SSL Vulnerability
A vulnerability CVE-2014-0160 which is known as Hearbleed Bug was released on 07 April 2014. The Heartbleed Bug is a serious vulnerability issue in the wildly used OpenSSL cryptographic software library. This issue allows stealing[…]