In the modern age of technology, new security threats arrive daily, but most don’t see the day of light in the public discussion. Every now and then, however, an exceptionally devastating threat makes the news, usually when it is already too late. Such was the WannaCry ransomware outbreak in 2017 which affected hospitals, universities and telecommunication providers in more than 150 countries, causing over $300 million in estimated damages. Now, a new threat has popped up, named BlueKeep or CVE-2019-0708.
It is a software vulnerability affecting older versions of Microsoft Windows...
Despite the controversies around the name, Google attempts to bring as much comfort and usability to its users as possible. One thing that the internet giant is against are paywalls for content. Many users prefer to browse the net using Incognito mode in Chrome for reasons of privacy. Unfortunately, there was a loophole present in older versions of the browser which allowed websites to detect whether the users were visiting in Incognito mode and many decided to include pages like this:
Of course, the “create a free account” is not as free as you think. There is a limit to how...
Despite the global efforts in cybersecurity, the internet is still a very dangerous place, filled with malware and spyware. Having a quality antivirus is crucial to the safety of your data and even hardware. This article will explain how you enable virus protection for your emails on your server running Plesk. Here's what you need to do:
Go to the Mail tab.
Click on the email address you wish to configure the antivirus on.
Click on the Antivirus tab and select the checkbox: "Switch on antivirus protection for this email address". Choose the desired mail...
What is a Proxy Server?
What happens when you browse the web? You type an address on your browser and within few seconds (even less) you get the page you wanted. Without your knowledge, you might have used a proxy server to access the internet.
A proxy server is an intermediary server which separates you from the website you want to access. When using a proxy server, the internet traffic initiated from you will flow through the proxy server to the destination. The destination website will send the results back to you through the proxy server (this doesn’t happen all the time). If...
Common Security Myths
When we’re surfing online, there are many ways to fall under a security breach. Here I will explain the most common security threats that are online, but we take it for granted. So let’s get started with the list.
Security Myth 1
“This cant happen to me, I’m a normal person and there’s nothing worth stealing from me. Only important and rich people get targeted.” Sounds Familiar? This is the number one myth most of the people believe to be true, but it isn’t. Cyber-attacks don’t happen depending on how important you are...
Today almost all the world has access to the internet and it's being integrated into our day-to-day life whether we like it or not. There’s a lot of things we can do through the internet and it has made life so much easier. We don’t have to leave the house in order to have food, we don’t have to wait for banks, we don’t have to go outside and wait for a taxi; all this was made possible due to the advancements of technology and internet. Although there’s a lot of positivity, there’s also plenty of negativity lurking within. This article is a continuation of...
Cybersecurity is a very broad topic which is growing day by day and has the notion that this is only for the experts.
So how can we as normal internet users apply it to our daily life? Should I have a degree in cybersec? Will I be able to secure myself without professional help?
Well, you’re in luck! I will provide a guide to help you to improve your digital security with as little hassle as possible!
The first thing to note is that anyone, anywhere, anytime can be a victim of hacking (including you), but there are a few things you can do to reduce the risk.
Use strong passwords for...
What is a Blacklist?
Depending on the source, the amount of daily spam emails being sent is anywhere between 80 to 95% of all emails sent on the internet that day. With such large numbers, most experts agree that manually sorting through your inbox to get rid of spam has become highly inefficient. As such, public blacklists of mail servers and IP addresses have been created to prevent repeat offenders from relaying spam.
A blacklist is a list of blocked domains, email addresses or IP addresses. When a website gets on one of these lists, users can no longer access the site directly and...
Microsoft Windows Server 2008 and 2008 R2 were both great technological breakthroughs in the hosting fields, introducing new features which are essential for any modern system, such as a shift from 32-bit to 64-bit computing, advanced analytics and budding server virtualization technologies. Unfortunately, all good things must come to an end, including Microsoft’s support for these industry-forming server operating systems. As many know, misfortune never comes alone, so along with their Windows Server 2008 versions, Microsoft is also discontinuing support for SQL Server 2008 and 2008...
Switching firewalld to iptables on CentOS
One of the most important changes to be made in the CentOS is changing iptables to firewalld. If you want to revert this switch and go back to using iptables, it is possible however, you must originally configure the firewall. Follow the steps outlined below to change firewalld to iptables.
Use the following code to install iptables:
yum install –y iptables-services
Then mask firewalld service:
systemctl mask firewalld
Now, we should enable the iptables service:
systemctl enable iptables systemctl enable ip6tables
Next, enter the...