Category: Security & Privacy

Keeping safe

How tech is transforming the intelligence industry

Shay Hershkovitz Contributor Shay Hershkovitz is a Senior Research Fellow at The Intelligence Methodology Research Center (IMRC). At a conference on the future challenges of intelligence organizations held in 2018, former Director of National Intelligence Dan Coats argued that he...

/ August 11, 2019

WordPress File Permissions: Securing Your Website

WordPress file permissions and ownership play an integral role in the overall security of your WordPress website, which is why you should be sure to get them right. In this post, we’ll cover all you need to know about WordPress...

/ August 3, 2019

How to Send Self-Destructing Messages in Gmail

How to Send Self-Destructing Messages in Gmail The art of the ephemeral email Some messages are meant to be private. The longer they sit around in your inbox, the more likely it is they’ll end up in the wrong place...

/ July 31, 2019

An exposed password let a hacker access internal Comodo files

A hacker gained access to internal files and documents owned by security company and SSL certificate issuer Comodo by using an email address and password mistakenly exposed on the internet. The credentials were found in a public GitHub repository owned...

/ July 28, 2019

How to Recognize Scams Targeting Your Website

One of the downsides to owning your own website or domain is that you have to register, mostly using personal information, in a public directory of sorts. Anyone can look up a URL or site and immediately see the owner,...

/ July 27, 2019

WordPress Vulnerability Roundup: July 2019, Part 1

New WordPress plugin and theme vulnerabilities were disclosed during the first half of this month, so we want to keep you aware. We divide the WordPress Vulnerability Roundup into four different categories: 1. WordPress core 2. WordPress Plugins 3. WordPress...

/ July 17, 2019

WordPress Vulnerability Roundup: June 2019, Part 2

New WordPress plugin and theme vulnerabilities were disclosed during the last half of June, so we want to keep you aware. We divide the WordPress Vulnerability Roundup into four different categories: 1. WordPress Core Vulnerabilities 2. WordPress Plugin Vulnerabilities 3....

/ July 2, 2019

How WordPress Websites Get Hacked

Your website is like a home – secure if you take the appropriate precautions, but vulnerable to burglars if you don’t. In the website world, however, sites don’t get burgled, they get hacked. The number of sites that get hacked...

/ June 29, 2019

WordPress Vulnerability Roundup: June 2019, Part 1

New WordPress plugin and theme vulnerabilities were disclosed during this month, so we want to keep you aware. We divide the WordPress Vulnerability Roundup into four different categories: 1. WordPress core 2. WordPress Plugins 3. WordPress Themes 4. Breaches From...

/ June 15, 2019

Which vSphere CPU Scheduler to Choose

The release of vSphere 6.7 Update 2 brought with it a new vSphere CPU scheduler option, the Side-Channel Aware Scheduler version 2 (SCAv2) or “Sibling Scheduler.” This new scheduler can help restore some performance lost to CPU vulnerability mitigations, but...

/ May 15, 2019

Magento GDPR: 7 Steps to Protect your Store (and your Customers)

After decades of loose online legislation and abstract digital data guidelines, the Wild Western days of the internet are ending. User privacy and data protection are frequently debated issues, especially with the recent concerns regarding morally questionable social media practices....

/ May 2, 2019

What is 2 Factor Authentication and How Can It Be Useful?

You may have heard how important 2 factor authentication (also known as two-factor authentication or 2FA) is for securing your online accounts. Don’t be embarrassed if you find yourself asking “What is 2 factor authentication?” Don’t worry, not knowing puts...

/ April 26, 2019

What you missed in cybersecurity this week

It’s been a busy week — it’s tough to keep up with all the cybersecurity news. We’ve collected some of the biggest cybersecurity stories from the week — from TechCrunch and afar — to keep you up to date with...

/ April 22, 2019