Blog

What you need to know about Cloudbleed

Internet security company Cloudflare revealed a major flaw in their system. The so-called ‘Cloudbleed’ vulnerability leaked customer information from thousands of websites, according to Cloudflare researchers. Fortunately, there have been no signs of exploitation, but that doesn’t mean you should be complacent.

New Mac malware linked to DNC hacking group

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit Linux, Android, and Windows vulnerabilities. Last month, they spread a new strain of malware that specifically targets Apple Macbooks.

Introducing Cloud Search for G Suite users

Google Cloud Search is the latest tool launched for business customers that allow users to search across their G Suite products including Drive, Gmail, Sites, Calendar, Docs, Contacts and more. It was previously available in a limited preview, named Springboard, and was described as something similar to Google Now for enterprise workers.

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running […]

3 Virtualization issues to watch out for

Although data storage is only one of the many ways to benefit from virtualized hardware, it’s still the most common use of the technology. Despite this popularity, virtualized storage is susceptible to a number of mismanagement catastrophes. We’ve outlined the three most common mistakes when utilizing this technology, right here.

How can I Keep From Getting Hacked?

Who Are You? Identity is the Key to Everything
In 2017, security revolves around your identity. The principle of knowing and verifying who you are is the key to granting you access to resources and data that you have appropriate permissions for.

Hardware and software firewalls and filters are still important, to be sure.