Blog
How to Strengthen Your Joomla Site’s Security
Thanks to its ease-of-use and extensibility, Joomla is used all over the world to power websites of all shapes and sizes. Best of all, this award-winning CMS (Content Management System)…
WordPress Security and Plug-ins Detailed Review
WordPress has become the world’s most popular website platform for blogs and generic websites. This is partly due to its flexibility and ease of use but one thing that often…
How to Improve WordPress Security
Here we have a great looking and useful infographic from a blogging infographics website called Your Escape From 9 to 5 that is packed with information to help you with WordPress security.…
Cyber Attack Statistics
Ever wanted to know where cyber attacks are coming from when they hit your business? Take a look at Tripwire’s awesome infographic which has a nice breakdown of the most…
The Rise of WordPress, Now More Secure with Security Plug-ins?
Popular website development platform WordPress is now used in over 25% of all of the world’s websites! This is an amazing feat for an open-source platform that was only born…
Making Drupal Secure with Modules and a Security Audit
Drupal is one of the world’s most popular open-source content management systems and is written using PHP. Drupal also has a wide community of open-source developers who contribute to modules…
Why Do We Need Penetration Testing?
Website Penetration testing basically describes the technical process of attempting to gain access to IT resources without knowing usernames and passwords, or other access routes, it covers testing of all…
Kali Tools Tutorials for Web App Testing
KALI TOOLS TUTORIALS FOR WEB APP TESTING Posted on July 31, 2016 Edited November 22, 2020 by admin Learn how to use the tools available on Kali Linux when performing advanced web application assessments. Official…
How Blockchain Helps Protect Your Data From Hackers
There is a great deal of noise around right now in the IT world regarding Data Science and Big Data. Many new job roles are being created in Data Science…
Drown SSL Vulnerability Checker
Taken from DROWNattack.com: DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS, some of the essential cryptographic protocols for Internet security. These…