Explained: regular expression (regex)

What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.
Categories:

Business
Technology

Tags: ddosJavaScriptnode.jsredosregexsearchservervulnerability

Continue reading Explained: regular expression (regex)

Can search extensions keep your searches private?

A lot of search extensions have been marketed over the year claiming to protect online privacy. Are they worth installing? We take a look at what these plugins actually have to offer.
Categories:

PUP

Tags: chromeextensionsprivacysearchsearchalg… Continue reading Can search extensions keep your searches private?

How to secure your content management system

Popular content management systems are easy to install and use. But how easy is it to keep them secure?
Categories:

Security world
Technology

Tags: CMSCMS securitycontent management systemsdrupalJoomlawordpress

(Read more…)

The post … Continue reading How to secure your content management system

How to protect your RDP access from ransomware attacks

Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?
Categories:

Business
Security world

Tags: businessransomwarerdpremote accessremote desktop protocol

(Read mor… Continue reading How to protect your RDP access from ransomware attacks

Explained: What is big data?

In our explained series, we talk about the impact of big data to our society. What is it, who uses it, and for what purposes?
Categories:

Security world
Technology

Tags: apopheniabig breachesbig dataInternet of ThingsIoTpersonally identifiable … Continue reading Explained: What is big data?

What’s the real value—and danger—of smart assistants?

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?
Categories:

Security world
Technology

Tags: alexaassistant… Continue reading What’s the real value—and danger—of smart assistants?

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?
Categories:

Business
Security world

Tags: breachcloudmanageme… Continue reading Can we trust our online project management tools?

Did my comment on your blog get lost?

Automatic filters on our blog sometimes catch benign comments in their nets. However, they also protect users from spammers, scammers, and malicious links. Read on to learn about our comment policy: what we block and why.
Categories:

101
FYI

Ta… Continue reading Did my comment on your blog get lost?

Five easy ways to recognize and dispose of malicious emails

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.
Categories:

101
How-tos

Tags: emailmalspamphishingred flagssafe pr… Continue reading Five easy ways to recognize and dispose of malicious emails