Affordable Web Hosting, Website Design, Software Dev, Online Advertising

From Our Blog

6 Million Password Attacks in 16 Hours and How to Block Them

Last week in the President’s cyber security op-ed in the Wall Street Journal he implored Americans to move beyond simple passwords and to enable two factor authentication or cellphone sign-in. One of the things we monitor at Wordfence is the number of brute force attacks on WordPress websites. Brute force attacks are password guessing attacks, where an …

wordfence-logo

Apple says No to FBI request to hack terrorist’s iphone

Apple Inc. CEO Tim Cook said that the FBI request that the company develop software to hack into one of its own devices, an iPhone 5c, used by gunman Syed Rizwan Farook, would set a dangerous precedent that could compromise security for billions of customers. The government, Cook contends, is asking Apple to create a …

iphone5_ios7

Hospital pays $17,000 ransom to malware hackers

The Hollywood Presbyterian Medical Center has paid a ransom of $17,000 to hackers who managed to install a malware on the hospitals computers. The ransom was paid in bitcoins, the crypto currency that is practically impossible to trace and is the choice currency for under-the-radar cyber transactions by cyber criminals. “The malware locks systems by …

bitcoin

Why is it beneficial to have a dedicated IP address

What is Dedicated IP Address? IP stands for Internet Protocol and is defined as unique address assigned to each computer that is connected to a certain network. Internet Protocol address plays the role of unique identifier that is used to provide actual location of a machine or a website in a given network. What is …

ssl-ip

Beware of the ransomware called Locky

A new ransomware named “Locky” is currently circulating in the wild and making the headlines. There are some good reports regarding Locky ransomware already available over the Internet. This blog intends to focus on some technical areas that (we believe) have not been covered yet, namely, its domain generation algorithm, command and control communication, and …

1 2 3 5 »
PAGETOP
Copyright © GBConcepts Online Services All Rights Reserved.
Powered by GBConcepts Online