Browsing Category
Cyber-security
Restaurants Are the Perfect Targets for Hackers
Any business that connects to the Internet is at risk of
being a target for hackers. Many business owners make the
mistake of thinking that they are too!-->…
Understanding the Importance of Password Hashing in Cyber-Security
Most developers know that you should store sensitive data only in an encrypted form, but what they don't know is the right way to do it. Asymmetric and!-->…
Why You Should Disable Adobe Flash on Corporate Desktops for Better Cyber Security
Adobe Flash is no stranger to zero-day exploits. The application has been under fire for years over its vulnerabilities and lack of security. Another!-->…
6 Awesome Things You Can Do on the Internet When You Have a VPN
A virtual private network is a powerful tool. When you have a VPN, to anyone monitoring your connection, it looks like you just go to the website of the VPN.!-->…
How to Spot the Bots on Social Media
After promising to bring people together and help them connect with old friends and former lovers, many social media companies have ended up doing the!-->…
5 Tips for Creating a More Secure Login Page for Your Website
Most websites have some way for a user to create an account and log in. With the numerous attacks available to hackers, it's important for website owners to!-->…
Creating Custom Logs in Your Applications – What Events Should You Be Tracking
It's not uncommon for developers to code their logging modules into applications. They do this to compensate for limitations in standard logging functionality!-->…
How to determine when a user is using a proxy
There are many reasons for a person to make use of a proxy connection, while cyber-security foul play is one well-known reason for using proxies; it is not!-->…
NewEgg Hacked by the Magecart Attack Using Skimmers to Steal Credit Card Information
There are many reasons to want to share one's credit card information online, such as online purchases, subscriptions, and various payments. However, things!-->…