Tag "Web Security"

Back to homepage

3 Reasons Why B2C Enterprises Should Use Single Sign-on Authentication

Single sign-on authentication, or SSO, is becoming more commonplace as the digital revolution continues to evolve. With numerous benefits for customers and companies alike, SSO helps streamline user experience, aid movement between


Our Smart Devices Should Warn Us About Cyberattacks And Data Reuse

Our lives today are filled with “smart” devices from our televisions to our toasters to our thermostats. These devices are nothing short of Web-connected miniature computers running entire operating systems


How to Secure Your CMS Website, Even if You Aren’t an Expert

Any time you visit a website, there’s about a 50/50 chance it was built on a content management system such as WordPress, Drupal, or Joomla. These platforms make building and maintaining an

Expert Articles Software

8 WordPress tips to make your website secure

By Julian Hooks – Community Manager at  MobileSignalBoosters, For anyone running a modern website, one common problem that you are likely to run into is website security. Keeping a website


7 Website Security Essentials for eCommerce Retailers

The internet offers ample opportunity to make money online, regardless of whether you’re selling physical goods or services. But setting up a profitable e-commerce business can be a complicated endeavor.

IT Compliance

How Tech Culture Has Changed Since The GDPR

As we approach the one-year anniversary of the GDPR which went into effect on 25 May 2018, we can now review the benefits and pitfalls of the EU’s General Data


A 13-year old hacker’s 3 top tips to beef up your cyber security

Reuben Paul looks like a regular 13-year old child, but don’t let that fool you. This hacking whiz kid delivered his first presentation at a hacker conference at the tender


Too fast, too insecure: Securing Mongo Express web administrative interfaces

Mongo Express is a lightweight web-based administrative interface deployed to manage MongoDB databases interactively. It is authored using Node.js, Express and Bootstrap packages. This case study highlights the deployment of Mongo


New Phishing scam called ‘The Hotlist’ now targets the Instagram users

The new scam operates in a similar manner as the recent ‘The Nasty List’ scam. The scam begins with Instagram users receiving a message regarding a list of their ‘hot’


What is Cryptojacking?

‘Cryptojacking’ is a term used to describe the action of secretly using a computer to mine cryptocurrency. The original form of cryptojacking would involve the victim unknowingly installing software on