You can just call us +4 143 508 0794

security

home / blog / tag / security

10 common database security issues

May 14, 2018
DataBase Security Issues

Databases are very attractive targets for hackers because they contain valuable and sensitive information. This can range from financial or intellectual property to corporate data and personal user data. Cyber criminals can profit by breaching the servers of companies and damaging the databases in the process. Thus, database security testing is a must. There are numerous incidents where hackers have targeted companies dealing with personal …

Continue reading

Top 5 iOS Development Security Pro-Tips That Will Save Your Business From Headache And Losses In No Time

July 27, 2016

Apple makes an all-out effort to make the App Store a “walled garden” and keep the owners of their mobile gadgets safe and sound… unless it doesn’t. The garden is still filled with snakes, bugs and hungry malware. Despite all the built-in security features, hackers manage to penetrate approximately 40% of the most-used free iOS apps. Hundreds of top-featured iOS apps were infected with malware …

Continue reading

What Will Online Security Look Like in a Year?

February 15, 2016

The year 2015 could be considered an absolute mess when it comes to online security, and the frightening part is that it seems to be part of a trend of growing threats and inadequate responses. We saw endless attacks on the corporate sector and data centers, the growth of mobile threats as the smartphone market becomes more mainstream, and scammers use data in ways we …

Continue reading

Will You Get Through The Zombie Apocalypse Alive? (+Infographics)

October 30, 2015
Zombie

Yay, its Halloween soon. Time of fright and the night of spooks. Vampires and witches crawl out of their corners but are they really the worst case scenario? Of course not, there are… ZOMBIES! With all this zombie apocalypse hype going around we could not have missed an opportunity to visualize how even seemingly simple elements of technology improve chances for survival. Happy Halloween! We …

Continue reading

TOR: Protecting Your Right for Anonymity

October 15, 2015
Darknet

What do you conjure up in mind when you hear Darknet? Illegal weapons, pornography and drugs? Well, in fact, it is not only about it. There is a large part of Darknet which is legal and aims at protecting a person’s right for anonymity first of all. In countries with authoritarian government TOR has been a critical instrument for dissident movements. It has also proven …

Continue reading

3 tips how to make a good cloud disaster recovery plan

October 2, 2015

What is DRP Disaster recovery plan is a plan which describes the procedures a business has to follow to handle potential disasters. It covers consistent steps which are to be taken before, during and after a disaster. Its aim is to minimize losses and reduce recovery time and costs. Nowadays it is more and more associated with recovery of IT data and facilities. Benefits of …

Continue reading

Top 3 Most Devastating Viruses of the 21st Century

October 1, 2015
Viruse

Malware, spyware, ransomware, spam, trojans, worms and thousands of other possible threats are now spread all over the web. Amount of hacked sites, user accounts, computers and servers skyrockets today. Mankind has experienced tremendous downfalls due various software viruses and businesses have lost billions of dollars already due malware. It’s not only development of software that requires effort, precision, accuracy and skill today, but maintenance …

Continue reading

Virtual Private Networking: Do You Want Your Data Cyber Safe?

September 30, 2015

A little bit of history Before the advent of the Internet all the communication in the US was performed via telephone system and went through central hubs. If anything happened with some of them (nuclear attack, for instance), the communication infrastructure would be broken and communication between cities would be disabled. During the times of Cold War, with all the arm race and threats of …

Continue reading

Stop Avoiding Hacks! Fight Them, And Google Knows How!

September 29, 2015
Captain america

Let’s face it, we don’t live in a world where our resources, after being put online can be hacked. It’s more of a “when will we be hacked” kind of thing. But the bigger picture in does not necessarily has to be that way. The problem simply lies in the fact that businesses, security professionals, online resources and hackers are trapped in an endless loop. …

Continue reading

Outsourcing Data Storages: a Blissful Relief or Security Nightmare?

September 22, 2015

Data is worth significantly more than gold and diamonds today. It’s worth more than any money, however there is a curious difference that adds significance to the equation. Gold and diamonds are valuable because they come in small numbers, while there are hundreds of terabytes of data. Such volumes of information require accurate and secure storages some businesses might not afford maintaining in-house. But is …

Continue reading
013