Years ago, colleagues from Yandex introduced the concept of Mayhem infections. In that post, they provided very detailed information about the malware, its functionalities and…
When a website is compromised, attackers frequently leave behind a backdoor – according to our research around 70% of all website hacks include a backdoor.…
When you build or remodel a house, construction workers create a strong framework that can withstand the elements to keep your home and possessions secure.…
Hackers are constantly scanning the internet for exploitable sites, which is why even small, new sites should be fully patched and protected. At the same…
For years, Google has been actively seeking ways to encourage website owners to implement SSL certificates. SSL allows websites to be accessed over HTTPS, which…
We’ve covered a lot of personal security practices, but many people forget how important it is to secure mobile devices, which are riddled with personal…
When talking about compromised environments, we often think that the website itself is the end goal but that’s not always true. In some cases, attackers…
A mobile malware is a malicious software that targets mobile/smartphones, tablets and similar devices. The attacks may vary from fatal damage to the OS (bricking)…