Home Search

unsecured servers - search results

If you're not happy with the results, please do another search
professional certifications, certificates, PKI, PKI Automation

NSA Releases Guidelines to Secure Wildcard TLS Certificates

0
The National Security Agency (NSA) in the U.S. is alerting government and public organizations about the risks associated with the use of wildcard Transport...
106 million Thailand visitors

Personal Data of 106 Mn Visitors to Thailand Left Exposed Online

0
Thailand is one of the popular tourist destinations with a large number of visitors from across the world. While the country is looking forward...
Microsoft Azure App, Zero-Day Vulnerability

Moving from Human Error to Human Firewall

0
Cybersecurity experienced multiple challenges in 2020. Rapid digitalization and the new normal — work from home — brought new opportunities as well as risks....
Dating Apps

Data Breach Affects Millions of Dating App User Records

0
Security researchers from cybersecurity firm Wizcase discovered misconfigured databases leaking millions of records belonging to five dating service providers in the U.S. and East...
blockchain-based social media, Parental Consent for Minors, Iranian Facebook accounts

Blockchain-Based Social Media Will Be More Secure

0
Platforms based on blockchain technology are currently garnering much public interest worldwide since they have always been an entry point for billions of individuals...
Cross-site scripting attacks

How Cross-Site Scripting Attacks Work and How to Prevent Them

0
With the prevalence of hacker intrusions, the consequences of not addressing the vulnerabilities and other security loopholes in your network systems could be severe....
Nanocore Netwire AsyncRAT, Cloud security, cloud computing

Cloud Security: Challenges and Trends

0
With nearly 50% of the global corporate data being stored in the cloud, it is no surprise that cloud security has become an essential...
Honeypot

How Honeypots Boost Organizations’ Security

0
Cybercriminals often leverage various phishing lures to attract unwitting users. Similarly, security professionals also rely on the honeypot technique to attract cybercriminals and find...
sniffing attacks

Sniffing Attacks and How to Defend Against Them

0
Sniffing attacks are gaining prominence among cybercriminals today to steal customer data and compromise network security. Sniffing attacks, a significant security risk, enable common...
data integrity, website, security

Is Your Website Hackable? Here Is How to Find Out

0
There are nearly two billion websites on the Internet. Security flaws in many of them are fertile soil for easy takeover. Analysts claim that...

MOST POPULAR

RECENT POSTS