Is WordPress Secure for eCommerce Websites?

Are you thinking of building a WordPress eCommerce website? If yes, then you might be thinking about the fact that is WordPress secure to use or not? Yes, it is true that due to several issues, this software faces problems, and often we hear the new of WordPress Vulnerability.    Although, every year, many attacks are […]

Top Ten security settings for a secure Windows 10 Computer

Windows 10 is by far the most acknowledged Windows operating system. Microsoft rolls out updates frequently to ensure bugs are fixed and also the user experience is enhanced. Even as these updates are intended to improve the system performance and security, it is important for you to alter a few settings to improve system security […]

Magento Marketplace was hacked; the most insecure platform

Data protection experts reported an intrusion that has impacted Adobe Magento Marketplace users, employed to purchase, sell, and download themes and plugins for Magento-based online stores. Through an email, the company notified its customers, noting that hackers took advantage of a known vulnerability in the Magento Marketplace website to access compromised systems, resulting in unauthorized […]

Palo Alto suffers data breach. Are its customers’ networks secured?

Information security specialists reported that Palo Alto Networks, a major security firm based in California, US, has become victim to a data breach that led to the exposure of personal information from former and current employees. Compromised data include details such as names, dates of birth, and employee social security numbers. Through a private email […]

OWASP Juice Shop v9.3 releases: intentionally insecure webapp for security trainings

OWASP Juice Shop OWASP Juice Shop is an intentionally insecure web app for security training written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. For a detailed introduction, full list of features and architecture overview please visit the official project page here. Setup Deploy on Heroku (free ($0/month) dyno) Click […]

How to choose secure software for your business

Technologies have grabbed the leadership surrounding us with an enormous amount of information. Some services gather everything in one place and for any taste. Look around at how many people are there dreaming about a new computer, a tablet or a smartphone to consume the content and produce value for others. Among all possible reasons […]

Is it secure to use Monero? Cryptocurrency website and wallet are hacked

Digital forensics specialists report that the official website of Monero, one of the most popular cryptocurrencies, was compromised due to the presence of a malware-infected file capable of extracting funds from account holders. Apparently it all started on November 18, when a user found the infected file and reported the problem to GitHub. Hours later, […]

Wireless Router security: How to set up a WiFi router securely

Highly useful and practical as they are, wireless routers can cost us a lot if we fail to secure them properly. It is not only a few cases of hackers, scammers, and even identity theft that keep on appearing in the daily news headlines. Some of these arise out of the poor security set-up some of […]

AMP for Email: why so secure and how to get whitelisted?

If you’re reading this post, you are probably more or less familiar with brand new AMP for Emails technology developed by Google. It turned out that new horizons are opened wide for the commercial email channel. Therefore email marketers don’t have to retrain into plumbers or waiters. However, new skills and knowledge are obviously required […]

Gmail is the most secure email service. What about the most insecure? It’s AOL. Full list of email services most exposed to hackers

Unfortunately, data breaches are very common incidents today, with email addresses being one of the most exposed data in these cases. In this regard, information security experts, in collaboration with the firm Who Is Hosting This, conducted a study to find the most secure email services, as well as those most exposed to hackers. One […]

Unsecured Adobe Server Exposes Data for 7.5 Million Creative Cloud Users

The U.S. multinational computer software company Adobe has suffered a serious security breach earlier this month that exposed user records’ database belonging to the company’s popular Creative Cloud service. With an estimated 15 million subscribers, Adobe Creative Cloud or Adobe CC is a subscription service that gives users access to the company’s full suite of […]

Medical records of millions of people around the world exposed by insecure software

A group of information security specialists from the security firm WizCase (complete report here) has reported the finding of multiple data leaks from medical websites and software solutions around the world. The compromised information includes prescriptions, diagnoses, Social Security numbers and, in many cases, full names and addresses. All databases were found unsecured, as experts […]

Avast internal networks were hacked. Did attackers install backdoors in CCleaner? Is it secure to use this tool?

Even security companies are exposed to cyberattacks. IT system audit specialists report that security software developer Avast has become victim of an attack on their internal networks. Through a statement, the Czech-based company mentioned that hackers most likely tried to inject malware into the CCleaner tool code, similar to the incident occurred a couple of […]

Palo Alto, Fortinet and Pulse Secure VPNs are vulnerable to attacks: NSA

Ironically, companies that offer information security services are also exposed to malicious hackers; they’re even a great target. Experts from the National Cyber Security Center (NCSC) and the National Security Agency (NSA) have released a report warning about serious vulnerabilities in some of the most popular virtual private network (VPN) services. The companies noted in […]

Password-protected PDFs are not enough to secure sensitive documents. No solutions available

Any deployment, no matter its protections, may be exposed to further hacking attacks. Ethical hacking experts have found a way to extract information contained in Portable Document Format (PDF) files encrypted or password-protected. The group of researchers at Ruhr-Bochum University in Germany published a research entitled “Breaking PDF Encryption”, which reveals two variants of a […]