Author: SiteLock Page 1 of 24

Free Webinar: Security Trends Impacting Your Website

Please join SiteLock for our next webinar as we examine the latest cybersecurity trends and data from our 2019 Website Security Report.

The report analyzes more than 6 million websites to determine the most prevalent cyberthreats websites face today, and provides unique insight into the top website risk factors and emerging trends for 2019. 

Hosted by SiteLock Product Marketing Specialist, Monique Becent, the webinar will cover: 

Read More

website security

SiteLock INFINITY Wins 2019 Cloud Computing Product of the Year

We are excited to announce that SiteLock®INFINITY™ was recently recognized as a winner of the 2019 Cloud Computing Excellence Product of the Year Award by TMC’s Cloud Computing Magazine. The Cloud Computing Product of the Year Award honors companies with the most innovative, useful, and beneficial cloud products and services that have been available to deploy within the past year.

Read More

A Cybersecurity Checklist for the Modern Small Business [Top 8 Tips]

Security is one of the most important aspects of any website. This is especially true today considering the fact that cybercrime continues to be a serious threat for businesses and users. The FBI states that “Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated.” In fact, websites experience a staggering 62 attacks per day, according to SiteLock research. Now more than ever, small businesses need a cybersecurity checklist when building and maintaining their websites.

When cybercrime happens to your company website, you can lose money, credibility, and customers. Left unchecked, your website could be taken offline completely if the right hacker gets into it. With that in mind, let’s cover what you need on your cybersecurity checklist to protect yourself, your customers, and your company overall.

1. Set Your Site Up for Success with a Web Application Firewall (WAF)

Read More

SiteLock INFINITY Wins Fortress Cyber Security Awards Two Years in a Row!

We’re excited to announce that SiteLock® INFINITY™ has won the Threat Detection category for a Product or Service in the inaugural Fortress Cyber Security Awards presented by Business Intelligence Group. This is the second year in a row INFINITY has been recognized as a winner in this category.

Read More

Chatbot Security Risks: What you need to know before starting an online chat

What is a chatbot? Put in simple words, a chatbot is a software solution that uses machine learning to have a conversation (or chat as it is called) with another user online. You’ve likely seen these when you visit a website for a bank, or credit card company, a car sales website, or even a software business.

A few seconds after you land on the page, or sometimes upon arrival, a pop-up will appear that says something like “Hi, how can I help you?” or “Is there something you’re looking for?” If you answer the prompt, your chat with the bot will begin. Based on your responses additional prompts may be provided, or you might be redirected to a live representative for more help.

Read More

Currently Tracking: WordPress Plugin Vulnerabilities Causing Malicious Redirects

SiteLock research and remediation teams have become aware of several vulnerable WordPress plugins that are affecting our customers. The symptoms most commonly associated with these vulnerabilities are malicious redirects. Essentially, visitors are being sent to another website than the one they are attempting to access. We are still gathering information on these vulnerabilities, and how they are being used. As soon as we have completed our review, we will release more information.

The affected WordPress plugins are:

Read More

SiteLock 2019 Website Security Report: Protecting Websites in the Age of Stealth Attacks

Among the cryptojacking-buzz, Facebook’s data breach saga, and nation-state attacks on companies like Nissan, you likely noticed a trend of high-profile cybercrime in 2018.

However, after studying website attacks that plagued 2018, a new trend arises. Cybercriminals swept the web with secrecy, focusing on stealthy attacks to compromise websites rather than taking a more conspicuous approach.

Read More

Increasing Your Business’s Cyber Threat Intelligence

Authored by Sam Bocetta – Sam Bocetta is a freelance journalist specializing in U.S. diplomacy and national security, with emphases on technology trends in cyberwarfare, cyberdefense, and cryptography.

With more consumers and B2B enterprises conducting business in the cyber world, security threats are an increasing concern. While most business owners and website administrators are aware of the problem, too few have the information or resources they need to combat it. Winning the ongoing battle against cybercrime and criminals starts with understanding the nature of the threats and how to combat them.

How high is your business’ cyber threat intelligence?

Read More

When a Good Thing Goes Bad – How Vulnerabilities Were Intentionally Built into pipdig

Don’t just pay attention to the man behind the curtain, tear the curtain down and burn it. That’s been the general sentiment among the InfoSec community on Twitter this past week in the wake of the discovery of multiple vulnerabilities intentionally built into the popular pipdig Power Pack (P3) plugin. I could easily write 3,000 words digging into the code, but that’s been covered incredibly well already by other researchers. Instead, I’m going to focus more on the effects of this situation, and on how we as a security-minded community can make a difference going forward.

Read More

Microsoft Seizes Website

Microsoft takes control of websites from Iranian hackers. Is there an abuse of power in trying to help?

If cybercriminals were creating illegitimate websites to impersonate your brand and steal victims’ information—would you shut down those sites if you could?

That’s exactly what Microsoft did when it took control of 99 websites that Iranian hackers used to try to steal sensitive information from targeted victims, namely United States employees in the public and private sectors. According to Microsoft, the hackers “specifically directed” their attacks on government agencies in Washington.

Read More

Page 1 of 24

Powered by WordPress & Theme by Anders Norén