How To Configure Cloudflare To Maximize WordPress Speed + Security
This tutorial walks you through every single setting in Cloudflare.It’s specifically written…
How to Secure a Website 7 Simple Steps
How to Secure a Website: 7 Simple StepsInstall SSLUse anti-malware softwareMake your…
OWASP mobile top 10 security risks explained with real world examples
As mobile application developers we should be familiar with possible security risks…
A cryptocurrency exchange hack with a North Korean accent
The attack methods serious cybercriminals use are often so sophisticated that even…
MitM and DoS attacks on domains through the use of residual certificates
HTTPS certificates are one of the pillars of Internet security. But it…
Modern yacht hacking
Manufacturers of modern vessels didn’t escape the common trend of connecting various…
What is KRACK and how to protect your Wi-Fi devices
Most vulnerabilities go unnoticed by the majority of the world’s population even…
Hacking an aircraft: is it already real?
In-flight security made quite a lot of headlines earlier this summer, but…
KeyRaider malware affects only jailbroken devices. Who needs to worry?
While iOS is notorious for being innately secure, headlines over the past…