If you have been using WordPress for a long time you probably already know that you should be careful with certain plug-ins. Every plug-in can be an entry for malicious users. Last week a well-known plug-in called Yellow Pencil was removed by WordPress itself. The reason for this was that there was a flaw in the security which allowed a malicious user to perform actions as an admin. This means that they can modify your entire website and possibly kill it. The plug-in was removed on Monday April
If you have been on the Internet for a long time you will probably already be familiar with the security risks that exist. There are many malicious people who will do their utmost to find out your personal data. Not only your name and address but especially your bank or PayPal details so that they can do everything at your expense. You obviously don't want this to happen to you and that's why we decided to cover how you can best protect yourself against this in the blog post. Phishing One of the
If you have a web store then it is obvious that you do as much as possible to make your website as secure as possible. This applies to both your website itself and its database. If these are not properly secured a malicious user can easily extract the data. For example there are researchers from a VPN company who extracted various data from a database of a Chinese web store. After this intrusion the researchers were able to view various data including orders payment passwords and passport information.
If you have a website you want the data on it to be secure. This is not only nice for you but if your users know this it will also give them a safe feeling. One of the ways to show this to your users is by using a SSL certificate on your hosting. With a SSL certificate you have the ability to connect through https and then you also get a green lock at your domain. If your users see this lock they know that their data is safely stored on your website. This not only gives your users a secure feeling
Last week a new type of malware was discovered that targets Linux servers the virus then focuses on spreading a cryptominer. The virus has been named SpeakUp and is new Trojan horse and is now operating mainly on Linux servers in China. How it is spread Of course when it comes to things like this it's always useful to know how such a virus spreads and what any risks are. The malware is spread by the PHP framework called ThinkPHP here they exploit vulnerabilities in the framework to get onto the
Many plug-ins turn off TLS validation Many websites today use a Content Management System. Think of WordPress Hosting Joomla or Drupal. If you are using a Content Management System yourself then chances are you are using plug-ins. However many of these plug-ins restrict the use of SSL and TLS validation on websites. This can result in customers' sensitive information being intercepted. The research that was done on this also showed that a lot of plug-ins have the cURL settings set to false instead
Watch out for domain name fraud with Tikkie Tikkie is familiar to everyone it is an easy way to pay with your mobile for a refund or a meal. As with all popular payment methods such as PayPal and internet banking criminals are also capitalizing on this. The more people use them the more chance they have of success with their scams. Therefore Kassa conducted an investigation to find out exactly how this works. The excerpt from Tikkie can be viewed at the following link: https://kassa.bnnvara.nl/media/426271
Eighteen thousand data breaches reported since new privacy law Earlier this year the AVG law came into force this is a law that applies throughout the European Union. This law replaces the Wbp law and is therefore no longer valid. Since the law went into effect there have been eighteen thousand reports of security breaches. Under this law organizations and companies that have a data breach are required to report it to the national privacy authority. In the Netherlands there was already an obligation
Secure your phone Everyone has it in their pocket these days a cell phone. Whether you use it for business or for personal use you have to deal with it every day. That is why the security of your phone is very important almost as important as the security of your Hosting. But how do you make sure your phone is properly secured? That's what we are going to discuss in this blog post. Malware on your phone Just like your computer your phone can also be attacked through your phone it is usually less