Home Search

unsecured servers - search results

If you're not happy with the results, please do another search
professional certifications, certificates, PKI, PKI Automation

NSA Releases Guidelines to Secure Wildcard TLS Certificates

The National Security Agency (NSA) in the U.S. is alerting government and public organizations about the risks associated with the use of wildcard Transport...
106 million Thailand visitors

Personal Data of 106 Mn Visitors to Thailand Left Exposed Online

Thailand is one of the popular tourist destinations with a large number of visitors from across the world. While the country is looking forward...
Microsoft Azure App, Zero-Day Vulnerability

Moving from Human Error to Human Firewall

Cybersecurity experienced multiple challenges in 2020. Rapid digitalization and the new normal — work from home — brought new opportunities as well as risks....
Dating Apps

Data Breach Affects Millions of Dating App User Records

Security researchers from cybersecurity firm Wizcase discovered misconfigured databases leaking millions of records belonging to five dating service providers in the U.S. and East...
blockchain-based social media, Parental Consent for Minors, Iranian Facebook accounts

Blockchain-Based Social Media Will Be More Secure

Platforms based on blockchain technology are currently garnering much public interest worldwide since they have always been an entry point for billions of individuals...
Cross-site scripting attacks

How Cross-Site Scripting Attacks Work and How to Prevent Them

With the prevalence of hacker intrusions, the consequences of not addressing the vulnerabilities and other security loopholes in your network systems could be severe....
Nanocore Netwire AsyncRAT, Cloud security, cloud computing

Cloud Security: Challenges and Trends

With nearly 50% of the global corporate data being stored in the cloud, it is no surprise that cloud security has become an essential...

How Honeypots Boost Organizations’ Security

Cybercriminals often leverage various phishing lures to attract unwitting users. Similarly, security professionals also rely on the honeypot technique to attract cybercriminals and find...
sniffing attacks

Sniffing Attacks and How to Defend Against Them

Sniffing attacks are gaining prominence among cybercriminals today to steal customer data and compromise network security. Sniffing attacks, a significant security risk, enable common...
data integrity, website, security

Is Your Website Hackable? Here Is How to Find Out

There are nearly two billion websites on the Internet. Security flaws in many of them are fertile soil for easy takeover. Analysts claim that...