From Security to Reputation: The Impact of Not Having an SSL Certificate on Your Website
Discover how SSL certificates can help secure your website, build trust with your visitors, and improve your search engine rankings.
Discover how SSL certificates can help secure your website, build trust with your visitors, and improve your search engine rankings.
In this day and age, windows defender and a spam filter on your email account just isn't going to cut it anymore. The landscape of cybersecurity breaches and vulnerabilities is…
Padding Oracle On Downgraded Legacy Encryption (POODLE) was released with the CVE identifier of CVE-2014-3566. This vulnerability was discovered in SSL 3.0. This is different to the "HeartBleed" vulnerability which was…
As of the 25th Of May 2018, All businesses that have any data used to identify an individual MUST be GDPR Compliant. GDPR (The General Data Protection Regulation) is designed to harmonize…
Cyber security is crucially important in this day and age and should not be taken lightly. With technological advancements being made every single day, you might find it difficult to…
Cybersecurity researchers are working around the clock to actively monitor any possible areas of attacks. One of the most common methods that we are using is port scanning of variable…
One of the most crucial aspects of your new (or old) wordpress sites is security. This article is written to help you understand the fundamentals of WordPress security, we aim…
There are many different types of hosting out there that sometimes you might just get lost amongst all the different options! But do not fear, VMotion is here! For a…
How To Protect Yourself From WannaCry
The ransomware attack is holding computers hostage all over the world.
Here’s what you need to know about it to keep yourself as safe as possible.
WannaCry attack started on Friday of last week, locking people out of their computers by encrypting their files and demanding them to pay up to 300$ in Bitcoin. To make matters worse the price doubles after 3 days. To receive a decryption key or risk losing your important files forever. What’s worse is that the malware also acts as a worm, which means that it has potential to infect computers and servers on the same network!
In the very short: Yes, update right now. If you want more details read below.
ShellShock is a nickname given to remote exploit vulnerability in bash CVE-2014-6271. It could allow an attacker to gain control over a targeted computer if exploited successfully. All Linux installations running Bash shell are vulnerable to this exploit.
It is important to understand that (more…)