Link: Securing a Linux Server
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
I got this via e-mail alert from Barkly and thence to Bleeping Computer. Here’s the takeaway: What everyone should take away from this is that if you see a popup on a page stating that you need to download a Chrome Font Pack, you should immediately close the browser and not visit the site again….
They’ve laid out the critical data in a post titled Election Hack Report FAQ. This report includes clarifying that, despite their headline, they were not claiming that the report truly traced the hacking to Russia. I thought that was pretty clear in the first place, but I suppose “headline only” readers (not my favorite people),…
“Turned” nasty? I think hacking is nasty in general. It has been hard to change people’s attitudes toward hackers and copyright violators, because the damage is generally not physical. But the fact is that hackers and spammers cost businesses money. These activities are not some sort of harmless joke–they do damage. Anyone who works in…
I just got notice of a vulnerability in Firefox from Wordfence. I have no original information, but I have generallly found that the Wordfence people provie good information. I will post a comment here (an a note at the top of this post) when this vulnerability has been fixed. The one way to avoid the…
I think this article on MSNBC’s Red Tape Chronicles is good reading for the non-technically oriented. I have already encountered some of the programs mentioned on various computers. This should just be another warning to: Keep your anti-virus products up to date Keep your backups current Be very careful what you download from the internet…
Spoof emails can be convincing if they contain the right information. Further, how do you know whether you have actually been hacked? Here are some tips.
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)