Web Security

An Inforgraphic: How to Keep Your Internet Usage Private

It is no secret that our Internet activity is anything but private. Email, chats, videos, photos, file transfers, social networking details, and more can all be accessed at any given time. In fact, today’s internet giants are known to make our data available: AOL, Google, Facebook, Microsoft, Yahoo, and others have been reported to monitor our usage. Alternatively, there are service provides and tools that claim to keep your information and usage data private. WhoIsHostingThis.com, a web hosting comparison site, lists some in the infographic below:

An Infographic: How Safe is Your Website from Hackers?

What do an outdated image re-sizer, US Bank, and computer hacking have in common?  In 2012, this well-known bank fell victim to computer hackers due to an old WordPress plug-in. Hacking is a problem affecting millions of webmasters per year. 648,000,000 websites fall prey to hackers, due to some common neglect and vulnerabilities, that include: Using cheap hosting companies. Hosting outdated plug-ins. Maintaining poor or weak passwords. Leveraging out-of-date platforms, extensions, and third-party services. A number of weaknesses allow hackers access to your website’s operations and content, potentially halting or ruining present business affairs. Joomla and WordPress are among hacker-favorited sites, with almost half of the web’s top 100 blogs using WordPress for content management.  Hein...

An Infographic: Magic Lantern, a Keystroke Logging Software Developed by the FBI

Magic Lantern is keystroke logging software developed by the United States’ Federal Bureau of Investigation. Variously described as a virus and a Trojan horse, it can be installed remotely, via an e-mail attachment or by exploiting common operating system vulnerabilities. It’s unclear whether Magic Lantern would transmit keystrokes it records back to the FBI over the Internet or store the information to be seized later in a raid. The FBI intends to deploy Magic Lantern in the form of an e-mail attachment. When the attachment is opened, it installs a trojan horse on the suspect’s computer. The trojan horse is activated when the suspect uses PGP encryption, often used to increase the security of sent e-mail messages. When activated, the trojan horse will log the PGP passwor...

Scott Walters Named Director of Security at INetU Managed Hosting

Managed hosting and cloud provider INetU today that Scott Walters has been named Director of Security and will now be  responsible for the Company’s Security Operations Center (SOC), compliance audits and certifications. The news comes a few days after INetU announced major enhancements to its Client Center, including dynamic virtual scaling, the ability to add unmanaged virtual machines and available access through an Application Programming Interface (API). Under his new role, Walters will be responsible for: Data and network security. Scaling the Security Operations Center (SOC) team. Overseeing INetU’s   compliance audits and maintain certifications, such as SSAE 16, ISAE 3402, SOC 2, SOC 3 and PCI DSS. Working with INetU Labs in the development of new security products and...

Introduction to Cloud Storage: Understanding Your Options

Cloud storage solution is emerging as an alternative to the in-house data storage and backup.  It is a growing industry where data storage solution is offered through third-party managed platforms – typically over the internet.  Data, folders and files can be shared and stored in a multi-tenant, resource pool that is accessible from anywhere. Several types of cloud storage solutions are available for personal as well as business usage.  For example – one of the first and popular cloud storage services were Google Docs and Spreadsheets offered by the search engine giant.  They have played a pivotal role in popularizing cloud storage in both business and personal level. In a cloud storage environment, company and personal data can be accessed from anywhere and on any internet ena...

PRISM Exposé Boosts Swiss Data Center Revenues

The stringent laws which govern Swiss banks are derivative of the nation’s privacy legislation, and now – thanks to the PRISM scandal – the country is fast becoming the ideal location for those turning their back on the cloud. Recent leaks of the American National Security Agency’s (NSA) PRISM surveillance program have sparked growing concern over data privacy, with implications for global corporations using US-controlled cloud services, such as AWS, Azure and Dropbox. As a result, businesses are now turning to Switzerland for their data hosting needs. Swiss ‘private’ hosting companies are seeing huge growth because privacy in Switzerland is enshrined in law. As the country is outside of the EU, it is not bound by pan-European agreements to share data with other member states, ...

“DNSSEC Will Become a Standard Part of Any Offering Over time,” Dr. Burt Kaliski, Verisign

Change has been constant in almost every facet of life throughout the past, and technology industry is no exception. There is no uniformity in technology; it keeps on developing, improving, re-inventing itself, and in the process also changing the way it diffuses across the society. It’s always a pleasant sight to have people and organizations that support, facilitate and ensure adoption of these changes. If not for them, we’d still be stuck in the world of dial-up internet, huge computers, and rotary dial telephones. Heck, we wouldn’t even have been able to reach that world itself. And Verisign is one such organization. Through its efforts to ensure operational deployment of DANE, DNNSEC , IPv6 and many more protocols/products that seek to replace the traditional systems in place to...

Understanding Role of Code Signing Certificates in Mobile Application Security

Mobile Applications have met with wide acceptance globally, thanks to their easy installation, streamlined interface, great user experience, and the ability to download them  easily via online and offline stores. They lower the technical barriers and offer a simple and enjoyable user experience. Mobile application has become a giant business in the last few years,  and is still growing,  opening multiple doors of opportunities for software developers. Customers spend a fairly good amount of money on mobile applications because although there is no dearth of  free applications out there, they come with a trial period. In 2012, it is estimated that consumers spent approx. 14 billion dollars on downloading mobile applications. A number as big as that indicates a rapid evolution of  mobile app...

Learning How to install a Wildcard SSL certificate in WHM and Common Compatibility Errors

Last decade has seen a phenomenal growth in the usage of Internet. Accepted round the globe unanimously with wide arms, Internet has now become a part of everyone’s daily life. Everybody is now online, and in more ways than one would’ve imagined. People use Internet for checking news, keeping a tab on their favorite sports, listening music, watching movies, professional conversations, interacting with new people, online shopping etc. Online shopping is easy,  ubiquitous, provides a broad range of options to choose from, and most importantly saves time.  Businesses now realize the importance of being online, and most of them  have websites showcasing and selling their products. But it isn’t that easy to turn a visitor on your website into a customer. Netizens today are sma...

An Infographic- Weighing up the Cloud: Cloud security turns off 92% of IT Professionals

A survey of 120 IT professionals conducted by PEER 1 Hosting at the Cloud Expo trade-show in January revealed some common concerns among people when weighing up the cost of the cloud. Security threats topped the list with 92% of IT decision makers citing them as a reason preventing from adopting the cloud, while 42% claimed they were put off by the cost of migrating to the cloud. 89% of decision makers said Flexibility in the cloud encourages  them to make a purchase and 71% cited scalability as  a key factor. 12.5% of the respondents  believe that  cloud is a solution to the capex/opex debate. The very fact that only 20% of the respondents trusted the cloud enough to make a full transition – with 78% preferring to opt for a hybrid cloud solution highlights the high demand for simplified, ...

How to Install an SSL Certificate in Microsoft Exchange Server 2007 (With Screenshots)

With the increasing popularity as well as the need, SSL certificates are now becoming a prerequisite for any website that takes it’s users’ data security seriously. But mere purchase of an SSL certificate doesn’t make your website safe, it has to be installed properly on the web server if you want to reap all of it’s benefits. As a SSL certificate provider, we’ve noticed over the time that most of our customers face problems while  installing SSL Certificates in Microsoft Exchange Server 2007. Microsoft Exchange Server is a product from Microsoft which generally operates on Windows Server. It is a webmail server, scheduling/calendaring  software and contact manger. Till date many updated versions of  MES with numerous changes  have been released. The most date...

Understanding HTTPS, Types of SSL Certificates and Installing a SSL certificate for Microsoft Exchange 2007

With security risks becoming increasingly rife in  the Internet, SSL has become a vital entity to ensure the protection of the organizations. SSL, basically, is a security protocol designed to ensure the authenticity of a website’s integrity and the website’s content. Now, what SSL does is that it encrypts the data being transmitted between the source and destination, of course, after a secure connection is established between them. Websites involving money transactions and membership procedures, secured with SSL, are protected from cyber crimes very effectively and smoothly. Ok, SSL protects your websites. So far, so good. But how do  visitors or customers of a particular website confirm that it is secured and its safe for them to share their data here? After having a SSL installed on you...

Skip to toolbar