full screen background image

Category: Protection

Explanation of Rootkits & How To Stay Safe From Rootkits

Explanation of Rootkits & How To Stay Safe From Rootkits In this article I will explain what Rootkits are and how we can stay partially...

APACHE PROTECTION WITH MODSECURITY

There are so many ways to protect Web-server. On this post, I’m going to guide how to use ModSecurity WAF to protect Apache...

WLAN Security Protection

With the rapid development of the Internet, as well as portable computers, smart phones and other mobile intelligent terminal use...

Introduction to Anti-Phishing

Throughout the course of your day, think about all the clicking you do with your mouse. You click again and again while opening a...

Ασφάλεια & privacy στο Android; 4 εφαρμογές για λάτρεις του open-source

Eίστε λάτρεις των εφαρμογών ανοιχτού κώδικα και αναζητάτε τρόπους για να...

Kaspersky VirusDesk δωρεάν online σαρώσεις

Kaspersky VirusDesk: μια δωρεάν υπηρεσία από τη Ρώσικη εταιρεία ασφαλείας που σας...

How to use FAIL2BAN to protect SSH

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. Written in the Python...

Tech Tips: Πώς να προστατεύσετε το router & το δίκτυό σας από hackers

Κατά τη διάρκεια της τρέχουσας εβδομάδας είδαμε τη διαρροή νέων μυστικών...

Secure WordPress with X-Frame-Options & HTTPOnly Cookie

Protect WordPress website from XSS, Clickjacking Attacks Securing your website is essential for your online business presence. Over the...

How to Protect WordPress from Brute Force Attacks (Securing Web)

Attacking website using Brute Force is an old technique and still, exists on the Internet. Brute Force attacks can take your website down...

How to Install & Configure ModSecurity on Nginx

Nginx web server is used on more than 30% of website worldwide and growing. Considering the increase in online web threats, one the...

How to Implement ModSecurity OWASP Core Rule Set in Nginx

If you were securing Nginx with Mod Security then you would like to have OWASP core rule set (CRS) activated to protect from following...

How to Scan Website Security Vulnerabilities Automatically (Don’t Get Hacked)

Performing regular security scan to your website is essential. It can be time-consuming to do manually, and that’s why you need to...

How to find Web Server Vulnerabilities with Nikto Scanner

Scan your web server for vulnerabilities, misconfiguration in FREE with Nikto scanner 97% of application tested by Trustwave had one or...

5 Open Source Web Application Firewall for Better Security

Protect your web assets with Open Source WAF Thousands of website get hacked every day due to misconfiguration or vulnerable code. Web...

How to Secure IIS Web Server with WebKnight WAF?

Learn the features of WebKnight web application firewall for IIS and installation procedure. Microsoft IIS (Internet Information Service)...

8 Online Services to Remove Malware and Clean Hacked Website

How to remove blacklist, malware, malicious code and clean infected website? There are many reasons for the website to get hacked or...

7 Mobile App Scanner to Find Security Vulnerabilities

Test if your Mobile App has any security flaws and fix it before it damages your business reputation. The latest research by NowSecure...

6 Unusual Optimization Tips to Speed-up and Secure Your Website

Performance & Security is two essential metrics for online business success. If your website is not loaded in less than 3 seconds, then...

7 SaaS Web Vulnerability Scanner for Continuous Security

Detect security vulnerabilities before anyone do by cloud-based web scanner. Cyber attacks are increasing and projected to cost $2 trillion...

11 WordPress Scanner to Find Security Vulnerabilities & Misconfiguration

Is your WordPress site secure enough? Find the flaws in your WordPress website and fix them before someone misuses it. The latest research...

How to Analyze Your WebSite like Hacker to Find Vulnerabilities?

A step-by-step guide to finding security flaws within web application using Detectify security vulnerability scanner. 97% of applications...

Top 7 DDoS Attack Protection Service for Better Security

Don’t let DDoS attack interrupt your business operation for reputational and financial loss. Use cloud-based denial of service protection...

List of Essential WordPress Security Plugins and Tips

The whole realm of online marketing and blogging would not have become familiar else Content Management Systems like WordPress. WordPress...

10 Security Apps to Protect Your Android Devices

A recent study has found that almost 87% of all the Android devices are insecure. These vulnerabilities arise due to lack of security...

How to Secure Joomla Website from Brute Force Attacks?

Joomla is second largest Open Source CMS platform powering millions of websites from small to enterprise level. There are many techniques...

10 Best Free Antivirus to Protect Your PC

31.9% of computer users were affected by malware attack in 2016. However, to control such attacks, various third party companies have...

10 Premium Antivirus to Secure Your Computer

There are many free Antivirus software for Windows, MAC but they have some limitation. If you are serious about securing your PC, then you...

6 Magento Security Scanner to Find Vulnerabilities & Malware

Magento rank number three with more than 7% market share in e-Commerce platform. If you own an online shop then most probably you would...

14 Essential Tips to Protect Magento from Online Threats

Running an eCommerce website is challenging, and one should consider doing all it takes to secure from cyber attacks. Latest forecasts say...