Web Security

WordPress 4.9.7 fixes critical media vulnerability in 4.9.6 and earlier versions

WordPress has fixed a very critical vulnerability existing in the versions 4.9.6 and earlier. The latest WordPress 4.9.7 has been released with more security and maintenance improvements. According to...

Top 6 emerging cybersecurity and risk management trends: Gartner

One of the main security objective of all the organizations is to protect information confidentiality. The organizations must consider IT security and IT risk management as a part of the executive bus...

Fortinet sees Bradford acquisition as key factor to secure expanding multi-vendor wired and wireless environments

Earlier this month, the leading cybersecurity solutions provider Fortinet completed the acquisition of network access control vendor Bradford Networks. The acquisition is aimed at extending the micro ...

Oracle fixes Spectre with retpoline supported UEK4 

Oracle updated the UEK4 (Unbreakable Enterprise Kernel) to include support for retpoline, that can mitigate the Spectre from all the processors with Variant 2 vulnerabilities. The Meltdown and Spectre...

Let’s Encrypt to now issue free Wildcard certificates through ACMEv2 

Let’s Encrypt, the non-profit certificate authority, has announced that wildcard certificates and ACMEv2 will now be supported. With this announcement, Let’s Encrypt takes a step ahead to make HTTPS a...

India faced over 53,000 cyberattacks in 2017: CERT report 

More than 53,000 cyber security incidents took place in India last year, as per a report by Indian Computer Emergency Response Team (CERT-In). The report was submitted to Indian Parliament by IT Minis...

Plesk and Acronis partner to provide easy server-backup and recovery solution 

Plesk, the leading WebOps platform provider, recently announced its partnership with Acronis, a global leader in hybrid cloud data protection and storage. Plesk will now integrate Acronis Backup Cloud...

Cisco makes technology to identify malware in encrypted traffic generally available  

Cisco announced the general availability of Encrypted Traffic Analytics (ETA), the technology which can detect the malware in encrypted traffic. ETA was available for preview since June 2017, where Ci...

Microsoft open sources Project Cerberus to protect firmware from cyberthreats 

Microsoft has unveiled the blueprint for a new open sourced industry standard for platform security called Project Cerberus. It will enable organizations to tighten the security around cloud environme...

The U.S. Cloud Computing Industry Stands to Lose $22 to $35 billion as a Result of PRISM Exposé

The recent revelations about the extent to which the National Security Agency (NSA) and other U.S. law enforcement and national security agencies have used provisions in the Foreign Intelligence Surve...

How Important is Server Location For Your Business?

Almost every business relies on some form of server technology, but does the location of this technology truly matter? Where does your data normally end up? An increasing number of businesses are comi...

An Infographic: Understanding Identity theft, Computer viruses and General Internet safety

OpenCollege recently developed this go-to resource on Cyber Safety, which is a compilation of various internet safety tips and tricks one needs to be aware with while surfing the web. Covering many se...

Skip to toolbar