Page 44 of 69

Ask a Security Professional: Malware Analysis Series — Part One: Signature-Based Analysis

Back in February, a colleague and I delivered a talk on website security at WordCamp Miami. Among the many great questions we received both during the talk’s Q&A and at our sponsor booth, one common theme kept reoccurring from attendees: How does malware detection really work?

If you want to check out our WordCamp Miami talk, “Beyond the Basics: Building Security into Your Development Projects,” and the corresponding slides are available online.

Read More

SiteLock Website Security

Celebrating our Freedom to a Safe and Accessible Internet

We celebrate Independence Day to honor the adoption of the Declaration of Independence on July 4, 1776. As Americans, we have the right to freedom of religion, speech, press, and the Internet.

Read More

Let Freedom Ring…

…for all WordPressers!

The Cost of a data breach

Calculating the Cost of a Data Breach [Infographic]

The cost of a data breach is rising globally. Learn how different countries and industries are impacted when they’re hit with one.

Read More

WordCamp Europe 2016

At 2,200 attendees, WordCamp Europe (#WCEU) 2016 was officially the largest WordCamp ever held. Tickets sold out over six months in advance, prompting organizers to quickly allocate additional tickets and arrange additional presentation space.

WCEU 2016 was hosted in the MuseumsQuartier of beautiful Vienna, consisting of three very large tracks and the sponsor hall, where the SiteLock booth could be found front and center. From a total 220 applicants, 75 speakers were selected to present at WCEU on subjects ranging from the REST API to figuratively “herding cats.”

Read More

Data breaches

Cybercriminals are Oversharing with Social Media Data Breaches

It’s been a busy time for data breaches in the social media world with Myspace, LinkedIn and Twitter all experiencing them. In each of these cases, the cybercriminals behind the breaches were after usernames and passwords. The most commonly used passwords today are, “password” and “123456,” and it only takes a hacker .29 milliseconds to crack them.

Read More

Turkish SEO spam

Analysis Of An SEO Spam Campaign

Search engine spam, more frequently known as SEO spam, is a technique used to manipulate rankings in a way that is not allowed by search engine terms of service.

This week we’ll take a look at an interesting SEO spam campaign that recently came across the SiteLock research desk. Turkish escorts are apparently big business and we had the opportunity to dig a bit into the makings of a malicious Turkish escort spam campaign.

Read More

Ask a Security Professional: Firewall Series – Part Three: Stateless vs Stateful

In Part Three of our firewall series, we’re drilling down into some of the mechanisms used in firewalls, namely the progression from stateless to stateful packet filtering. First, packet filtering is the action of inspecting the traffic traversing the firewall’s network to determine if the traffic is meeting the firewall’s security policy. Traffic conforming to the firewall’s security policy is allowed to proceed, while traffic not meeting the policy (e.g. a malicious attempt) is blocked.

Read More

Case Study: YeeWittleThings

Company Background

Brandi Yee is the owner and writer of YeeWittleThings, a family-friendly blog that offers product reviews, giveaways, recipes and lifestyle information to its readers. Yee is happily married, has two kids and takes pride in writing about family-focused topics.

Yee’s passion lies in her blog. “I started my blog over six years ago as a way of creating an outlet for my passion of writing, but also to connect with families and offer them recipes, honest reviews on family-friendly products and the opportunities to try those products themselves,” she says.

Read More

why would someone hack my website

Why Would Someone Hack My Website?

It is hard to keep track of all the websites that are compromised on a daily basis. Cybercriminals are constantly crawling the web for targets, and they’ll often go after websites you might not expect, such as a vegan cooking blog. So what does a hacker look for in a website? And why would they be tempted to attack your site? Here are some examples so you have an accurate picture of common website attacks.

Read More

Page 44 of 69