plug-in
Assessing Content Management System Security
As more businesses turn paperless and strive for more efficiency, content management systems become more and more popular. But having all your sensitive information in one place can be a risk. The ...
13 Reasons Why WordPress Hacks are Successful
In the attacker’s world, all vulnerabilities and potential exploits work toward the hacker’s advantage — not yours, not mine. This includes WordPress hacks. While living back east (over a decade ago), I ...
New Phishing Kit Allows Bypassing Two-Factor Authentication with Ease
Attackers have a new phishing tool in their arsenal, and it’s a powerful one. A penetration tester released an open source toolkit that can be used to easily set up phishing attacks ...