How to Strengthen Your Joomla Site’s Security
Thanks to its ease-of-use and extensibility, Joomla is used all over the world to power websites of all shapes and sizes. Best of all, this award-winning CMS (Content Management System) is an open-source solution, which means it’s freely available to everyone. Great news for web developers that like to share ... Read More
WordPress Security and Plug-ins Detailed Review
WordPress has become the world’s most popular website platform for blogs and generic websites. This is partly due to its flexibility and ease of use but one thing that often gets overlooked with new WordPress sites is security! Don’t leave securing your new WordPress website until the hackers come knocking! ... Read More
How to Improve WordPress Security
Here we have a great looking and useful infographic from a blogging infographics website called Your Escape From 9 to 5 that is packed with information to help you with WordPress security. The infographic is broken down into sections including how do WordPress blogs get hacked, statistics, how to prevent WordPress security ... Read More
The Rise of WordPress, Now More Secure with Security Plug-ins?
Popular website development platform WordPress is now used in over 25% of all of the world’s websites! This is an amazing feat for an open-source platform that was only born on May 27th 2003, the blink of an eye in web technology circles! It has now surpassed other favoured development platforms ... Read More
Making Drupal Secure with Modules and a Security Audit
Drupal is one of the world’s most popular open-source content management systems and is written using PHP. Drupal also has a wide community of open-source developers who contribute to modules and Drupal themes. Drupal was developed considering security and still gets regular updates to fix any known security issues. Unfortunately, ... Read More
Why Do We Need Penetration Testing?
Website Penetration testing basically describes the technical process of attempting to gain access to IT resources without knowing usernames and passwords, or other access routes, it covers testing of all these gateways to your precious data! Bear in mind that any hacker’s ultimate objective is gaining access to important data, ... Read More
How Blockchain Helps Protect Your Data From Hackers
There is a great deal of noise around right now in the IT world regarding Data Science and Big Data. Many new job roles are being created in Data Science related roles including in the field of Information and IT Security. Within all this there is a newly emergent data ... Read More
Drown SSL Vulnerability Checker
Taken from DROWNattack.com: DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS, some of the essential cryptographic protocols for Internet security. These protocols allow everyone on the Internet to browse the web, use email, shop online, and send instant messages without third-parties ... Read More