Blog

Category: Web Security

Add permitted IP access to your Web Server – required by Sucuri.

To avoid attacker to bypass your website firewall from Sucuri. You need to make sure the virtual host ( the protected domain name) accessed by the permitted server IP...

Read More
December 9, 2017, Written by 0 comment

How to protect your website?

  A website is using WordPress, Joomla, Drupal is common. There is a huge collection of plug-ins, modules, and components. Most are free can download from the internet.   Because...

Read More
December 8, 2017, Written by 0 comment

What is DNSSEC ? And why it is important.

To reach someone else on the web you must type a target into your computer – a real name or lots. That target needs to be unique so computers...

Read More
December 4, 2016, Written by 0 comment

WooCommerce Plug-in Cross-Site Scripting Vulnerability

WooCommerce is an open source e-commerce plugin for WordPress. It is designed for small to large-sized online merchants using WordPress. According to WooCommerce, the plugin now powers over 30%...

Read More
November 19, 2015, Written by 0 comment

Joomla 3.4.3 released, 2 day after 3.4.2

Joomla 3.4.2 was published a day before yesterday, unfortunately several high priority issues were found as people upgraded live sites which never occurred throughout the testing phase – therefore...

Read More
July 3, 2015, Written by 0 comment

Protect your mail server from ylmf-pc bruteforce

If you have been getting regular brute force attacks which has cmd: EHLO ylmf-pc from different IPs. These bruteforce can be blocked and it’s easy to do it with...

Read More
June 26, 2015, Written by 0 comment

Windows Cloud Servers and Dedicated Servers are protected from RDP Bruteforce

You might not have been aware that Kaspersky Endpoint Security comes default for our Microsoft Windows Cloud Servers and Dedicated servers  which included Intrusion Detection System, and now it...

Read More
May 26, 2015, Written by 0 comment

SSH With Two-Factor Authentication, Google Authenticator

To protect your SSH server with an two-factor authentication, you can use the Google Authenticator PAM module. Each time you are connecting to your server via SSH with Google...

Read More
May 5, 2015, Written by 0 comment

Popular WordPress Plugin ‘SEO by Yoast’ Vulnerable To Hackers

Yoast, a popular SEO plugin for wordpress version 1.7.3.3 and below have been found to be affected by two authenticated (admin, editor or author user) Blind SQL Injection vulnerabilities.The...

Read More
March 13, 2015, Written by 0 comment