Steps to Keep Your Site Clean: Updates

This is the second post of a series about Steps to Keep Your Site Clean. In the first post, we talked about Access Points; here we are going to offer more insight on Updates.
Updates
Repeatedly we see websites being infected or reinfected when im… Continue reading Steps to Keep Your Site Clean: Updates

GDPR: Privacy and Security by Design

GDPR & JumpCloud: Privacy and Security by Design European Union (EU) data protection laws will experience significant change when May 2018 rolls around, and the General Data Protection Regulation (GDPR)…
The post GDPR: Privacy and Security by Des… Continue reading GDPR: Privacy and Security by Design

Equifax’s Servers Reportedly Had Glaring Holes Long Before Data Breach

Equifax reportedly took six months to take down a publicly exposed web application that could have allowed anyone on the internet to search and download sensitive personal consumer data. VICE Motherboard reported Thursday that an unnamed security researcher alerted Equifax about the exposed application in December 2016, but the company didn’t take steps to secure..

The post Equifax’s Servers Reportedly Had Glaring Holes Long Before Data Breach appeared first on Security Boulevard.

Continue reading Equifax’s Servers Reportedly Had Glaring Holes Long Before Data Breach

Backdoor Found in Popular Server Management Software used by Hundreds of Companies

Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They are now adopting more clandestine techniques that come with limitless attack vectors and are harder to detect.

Recently, cyber crooks managed to infiltrate t… Continue reading Backdoor Found in Popular Server Management Software used by Hundreds of Companies

IoT Security is Hard: Here’s What You Need to Know

Security for anything you connect to the internet is important. Think of these devices as doorways. They either allow access to services or provides services for someone else. Doorways need to be secure — you wouldn’t leave your door unlocked if you lived in the bad part of a busy city, would you? Every internet connection is the bad part of a busy city. The thing is, building hardware that is connected to the internet is the new hotness these days. So let’s walk through the basics you need to know to start thinking security with your projects.

If you …read more

Continue reading IoT Security is Hard: Here’s What You Need to Know

NTP DoS Exploit Released — Update Your Servers to Patch 10 Flaws

A proof-of-concept (PoC) exploit for a critical vulnerability in the Network Time Protocol daemon (ntpd) has been publically released that could allow anyone to crash a server with just a single maliciously crafted packet.

The vulnerability has been p… Continue reading NTP DoS Exploit Released — Update Your Servers to Patch 10 Flaws

Even A Single Computer Can Take Down Big Servers Using BlackNurse Attack

Yes, you only need a single laptop with a decent internet connection, rather a massive botnet, to launch overwhelming denial of service (DoS) attacks in order to bring down major Internet servers and modern-day firewalls.

Researchers at TDC Security O… Continue reading Even A Single Computer Can Take Down Big Servers Using BlackNurse Attack

Critical Flaws in MySQL Give Hackers Root Access to Server (Exploits Released)

Over a month ago we reported about two critical zero-day vulnerabilities in the world’s 2nd most popular database management software MySQL:

MySQL Remote Root Code Execution (CVE-2016-6662)
Privilege Escalation (CVE-2016-6663)

At that time, Polish se… Continue reading Critical Flaws in MySQL Give Hackers Root Access to Server (Exploits Released)

4 Flaws hit HTTP/2 Protocol that could allow Hackers to Disrupt Servers

If you think that the HTTP/2 protocol is more secure than the standard HTTP (Hypertext Transfer Protocol), then you might be wrong, as it took researchers just four months to discover four flaws in the HTTP/2 protocol.

HTTP/2 was launched properly jus… Continue reading 4 Flaws hit HTTP/2 Protocol that could allow Hackers to Disrupt Servers

High-Severity OpenSSL Vulnerability allows Hackers to Decrypt HTTPS Traffic

OpenSSL has released a series of patches against six vulnerabilities, including a pair of high-severity flaws that could allow attackers to execute malicious code on a web server as well as decrypt HTTPS traffic.

OpenSSL is an open-source cryptographi… Continue reading High-Severity OpenSSL Vulnerability allows Hackers to Decrypt HTTPS Traffic