full screen background image

Category: Protection

Top 10 Anti-Phishing Best Practices

Emails are one of the major modes of communication today. Companies rely heavily on emails when conducting their day-to-day operations....

Top 5 Strategies to Avoid Getting Hacked Online

While we are becoming increasingly more reliant on technology and storing our information online, this trend increases the quantity and...

Tips for Managing Physical Security

Source: GAO According to the security expert S. Harris, “physical security protects people, data, equipment, systems, facilities and...

Penetration Testing SQL server

Penetration Testing SQL server SQL Server is a relational database management system from Microsoft, which is used as a central location to...

ESET: Συμβουλές για κυβερνοασφάλεια και στις διακοπές

ESET: Αν ανήκετε στην κατηγορία των ταξιδιωτών που δεν μπορούν να πάνε...

Explanation of Rootkits & How To Stay Safe From Rootkits

Explanation of Rootkits & How To Stay Safe From Rootkits In this article I will explain what Rootkits are and how we can stay partially...

Top 20 Security Awareness Tips & Tricks

Keeping your data safe and far away from the clutches of the hacking community is a need of the hour in today’s world. We have compiled...

The Ins and Outs of Email Security Awareness

Email has been used as a medium for remote communication even before the World Wide Web and other technological breakthroughs came into...

Ways to Stay Secure When using File Sharing

When sharing small files over the Internet, you can always attach them to an email but, when the file is large, it may not be possible to...

Best Tips for Creating Strong Passwords

Passwords are an important safeguard for our data, yet so vulnerable: Verizon Enterprise recently reported that 63% of breaches are due to...

Managing Desktop Security

Why Is Desktop Security Important? Desktop security can be thought of as the first line of defense on a company’s network. By having...

Explanation of Rootkits & How To Stay Safe From Rootkits

Explanation of Rootkits & How To Stay Safe From Rootkits In this article I will explain what Rootkits are and how we can stay partially...

APACHE PROTECTION WITH MODSECURITY

There are so many ways to protect Web-server. On this post, I’m going to guide how to use ModSecurity WAF to protect Apache...

WLAN Security Protection

With the rapid development of the Internet, as well as portable computers, smart phones and other mobile intelligent terminal use...

Introduction to Anti-Phishing

Throughout the course of your day, think about all the clicking you do with your mouse. You click again and again while opening a...

Ασφάλεια & privacy στο Android; 4 εφαρμογές για λάτρεις του open-source

Eίστε λάτρεις των εφαρμογών ανοιχτού κώδικα και αναζητάτε τρόπους για να...

Kaspersky VirusDesk δωρεάν online σαρώσεις

Kaspersky VirusDesk: μια δωρεάν υπηρεσία από τη Ρώσικη εταιρεία ασφαλείας που σας...

How to use FAIL2BAN to protect SSH

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. Written in the Python...

Tech Tips: Πώς να προστατεύσετε το router & το δίκτυό σας από hackers

Κατά τη διάρκεια της τρέχουσας εβδομάδας είδαμε τη διαρροή νέων μυστικών...

Secure WordPress with X-Frame-Options & HTTPOnly Cookie

Protect WordPress website from XSS, Clickjacking Attacks Securing your website is essential for your online business presence. Over the...

How to Protect WordPress from Brute Force Attacks (Securing Web)

Attacking website using Brute Force is an old technique and still, exists on the Internet. Brute Force attacks can take your website down...

How to Install & Configure ModSecurity on Nginx

Nginx web server is used on more than 30% of website worldwide and growing. Considering the increase in online web threats, one the...

How to Implement ModSecurity OWASP Core Rule Set in Nginx

If you were securing Nginx with Mod Security then you would like to have OWASP core rule set (CRS) activated to protect from following...

How to Scan Website Security Vulnerabilities Automatically (Don’t Get Hacked)

Performing regular security scan to your website is essential. It can be time-consuming to do manually, and that’s why you need to...

How to find Web Server Vulnerabilities with Nikto Scanner

Scan your web server for vulnerabilities, misconfiguration in FREE with Nikto scanner 97% of application tested by Trustwave had one or...

5 Open Source Web Application Firewall for Better Security

Protect your web assets with Open Source WAF Thousands of website get hacked every day due to misconfiguration or vulnerable code. Web...

How to Secure IIS Web Server with WebKnight WAF?

Learn the features of WebKnight web application firewall for IIS and installation procedure. Microsoft IIS (Internet Information Service)...

8 Online Services to Remove Malware and Clean Hacked Website

How to remove blacklist, malware, malicious code and clean infected website? There are many reasons for the website to get hacked or...

7 Mobile App Scanner to Find Security Vulnerabilities

Test if your Mobile App has any security flaws and fix it before it damages your business reputation. The latest research by NowSecure...

6 Unusual Optimization Tips to Speed-up and Secure Your Website

Performance & Security is two essential metrics for online business success. If your website is not loaded in less than 3 seconds, then...