Tag Archive for: Keeping

Gravityscan, keeping WordPress sites safe

If your website, in common with roughly 25% of all websites, is running WordPress then it’s pretty much certain that it’s being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintained, they quickly become vulnerable to a huge number of exploits.

The root cause of this vulnerability is WordPress’ ecosystem of complex core software augmented by thousands of third party developers whose themes and plugins are often buggy and not quickly (or often, never) updated to fend off known security problems. Add to that many site owners being slow to update their core WordPress installation and you have an enormous and easily discovered collection of irresistible hacking targets.

To read this article in full or to leave a comment, please click here

Network World Security

Companies keeping Bitcoin on hand in case of ransomware attacks

Companies keeping Bitcoin on hand in case of ransomware attacks

Companies are stockpiling Bitcoin just in case they suffer a ransomware attack and need to quickly regain access to their data.

David Bisson reports.

Graham Cluley

Google Android Security Chief Talks Keeping Mobile Devices Safe – Fortune


Fortune

Google Android Security Chief Talks Keeping Mobile Devices Safe
Fortune
Google's lead engineer for Android security Adrian Ludwig explains how the search giant keeps its mobile devices safe from cyber attacks.
Understanding Android's balance between openness and securityTechRepublic
Will mobile security fall to the platform providers? | ZDNetZDNet

all 3 news articles »

“android security” – read more

Got big data? Check out these 100 best practices for keeping it secure

Big data is best known for its volume, variety, and velocity — collectively referred to as the “3 Vs” — and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices.

As its name would suggest, the CSA focuses on promoting the use of security best practices within the cloud computing world; corporate members include VMware, Microsoft, AWS, and Red Hat. In an earlier report, the CSA broke down big data security risks into a set of the top 10 major challenges. Now, for each of those, it presents 10 best practices designed to help enterprises keep their information safe.

To read this article in full or to leave a comment, please click here

Network World Security