Month: June 2016 Page 1 of 3

The Cost of a data breach

Calculating the Cost of a Data Breach [Infographic]

The cost of a data breach is rising globally. Learn how different countries and industries are impacted when they’re hit with one.

Read More

WordCamp Europe 2016

At 2,200 attendees, WordCamp Europe (#WCEU) 2016 was officially the largest WordCamp ever held. Tickets sold out over six months in advance, prompting organizers to quickly allocate additional tickets and arrange additional presentation space.

WCEU 2016 was hosted in the MuseumsQuartier of beautiful Vienna, consisting of three very large tracks and the sponsor hall, where the SiteLock booth could be found front and center. From a total 220 applicants, 75 speakers were selected to present at WCEU on subjects ranging from the REST API to figuratively “herding cats.”

Read More

Data breaches

Cybercriminals are Oversharing with Social Media Data Breaches

It’s been a busy time for data breaches in the social media world with Myspace, LinkedIn and Twitter all experiencing them. In each of these cases, the cybercriminals behind the breaches were after usernames and passwords. The most commonly used passwords today are, “password” and “123456,” and it only takes a hacker .29 milliseconds to crack them.

Read More

Turkish SEO spam

Analysis Of An SEO Spam Campaign

Search engine spam, more frequently known as SEO spam, is a technique used to manipulate rankings in a way that is not allowed by search engine terms of service.

This week we’ll take a look at an interesting SEO spam campaign that recently came across the SiteLock research desk. Turkish escorts are apparently big business and we had the opportunity to dig a bit into the makings of a malicious Turkish escort spam campaign.

Read More

Ask a Security Professional: Firewall Series – Part Three: Stateless vs Stateful

In Part Three of our firewall series, we’re drilling down into some of the mechanisms used in firewalls, namely the progression from stateless to stateful packet filtering. First, packet filtering is the action of inspecting the traffic traversing the firewall’s network to determine if the traffic is meeting the firewall’s security policy. Traffic conforming to the firewall’s security policy is allowed to proceed, while traffic not meeting the policy (e.g. a malicious attempt) is blocked.

Read More

Case Study: YeeWittleThings

Company Background

Brandi Yee is the owner and writer of YeeWittleThings, a family-friendly blog that offers product reviews, giveaways, recipes and lifestyle information to its readers. Yee is happily married, has two kids and takes pride in writing about family-focused topics.

Yee’s passion lies in her blog. “I started my blog over six years ago as a way of creating an outlet for my passion of writing, but also to connect with families and offer them recipes, honest reviews on family-friendly products and the opportunities to try those products themselves,” she says.

Read More

why would someone hack my website

Why Would Someone Hack My Website?

It is hard to keep track of all the websites that are compromised on a daily basis. Cybercriminals are constantly crawling the web for targets, and they’ll often go after websites you might not expect, such as a vegan cooking blog. So what does a hacker look for in a website? And why would they be tempted to attack your site? Here are some examples so you have an accurate picture of common website attacks.

Read More

WordCamp NEO 2016 – WordPress Community Interviews

In this edition of our WordPress Community Interview series, we chatted with a few of the folks we met at WordCamp Northeast Ohio.

It’s always interesting learning how others found WordPress, what they’re using it for, and what they intend to do in the future.

Read More

WordCamps: How They Started and Why You Should Go

WordCamps represent the very pulse of the WordPress community, brought to life with the enthusiasm and contributions of hundreds, if not thousands, of WordPress enthusiasts. They are becoming more and more prevalent throughout the United States and around the globe. With so much excitement and growth, we wanted to take a look back at where WordCamps started and why they have become such a strong force in the WordPress community.

A Brief History

The first WordCamp was the creation of Automattic Founder and CEO, Matt Mullenweg.

Read More

types of malware

Exploring the Different Types of Malware [Infographic]

Malware, short for malicious software, is typically installed on a website by cybercriminals. Malware is a broad term that refers to a variety of malicious programs. It can spread viruses, steal personal or financial data and even hijack computers. Read our infographic to learn about the different types of malware.

Read More

Page 1 of 3

Powered by WordPress & Theme by Anders Norén