7 February 2015

How to Install SSL Certificates

The SSL certificates are useful as they encrypt and thus protect data. This makes them invaluable for organizations or people who have to deal with credit […]
1 February 2015

GHOST: glibc vulnerability (CVE-2015-0235)

A potential security vulnerability was found in the glibc library, which has been assigned CVE-2015-0235 and is commonly referred to as ‘GHOST’. All versions of glibc […]
16 December 2014

How To Control SPAM In Your Organization

I know it is annoying isn’t it? Every time you open your email to check out important messages what you find is a long list of […]
26 November 2014

Magento Security Tips and Vulnerabilities

In 1960s, that’s when the term hacker came into being and was the first time when the word came into use. The invention of the word was […]
15 October 2014

POODLE: SSLv3.0 vulnerability (CVE-2014-3566)

Google has announced that they have discovered a vulnerability in SSL v3 which has been named as POODLE. This vulnerability in the SSLv3.0 protocol, has been […]
12 August 2014

10 Tips for Hardening a Linux Server

In light of all the complex and specialized attacks on Internet-facing servers, it’s very important to protect your cloud assets from malicious assailants whose sole purpose […]