Category: Security

Keeping safe

W

We All Could Pay a Price for the Latest Slap at Huawei

An international cybersecurity group has evicted the Chinese telecom company to comply with US sanctions. That could allow malware to spread more easily.

My SIM swap attack: How I almost lost $71K, and how to prevent it

On June 25th, I became a victim of SIM swapping, targeted along with dozens of other leaders in the blockchain community. This type of account takeover (ATO) fraud, also referred to as Port-Out scam, SIM

What Is Cyberwar? The Complete WIRED Guide

Not so long ago, stories about cyberwar started with scary hypotheticals: What if state-sponsored hackers were to launch widespread attacks that blacked out entire cities? Crippled banks and froze ATMs across a country? Shut down

NGINX Updates Mitigate the August 2019 HTTP/2 Vulnerabilities

Today we are releasing updates to NGINX Open Source and NGINX Plus in response to the recent discovery of vulnerabilities in many implementations of HTTP/2. We strongly recommend upgrading all systems that have HTTP/2 enabled. In

Cryptography For Software Engineers

You pay by credit card in an unknown shop. How do you make sure your card is not copied? you type your password into google.com and press send how do you know no one else

A Decentralised Blockchain-Based VPN Network Could Be The Future of Private Communication

Broadly speaking, there are three parties fighting the guerilla war on privacy and internet anonymity. Government agencies, cybercriminals and we average internet users who mostly give Facebook all of our information and then complain, on

How Crypto Thieves Affect the Financial Security Crypto Should Avail

Crypto assets have slowly assumed the reputation of being the next poster boy for the financial industry. However, throughout its long and tedious ascent to global reckoning, cryptocurrency still continues to beg the question of

How to Install and Use Tor Network in Your Web Browser

Privacy Online is becoming a big deal and concerned Internet users are continuously looking for effective methods or tools for surfing the web anonymously for one reason or the other. By surfing anonymously, no can

Ask NGINX | April 2019

Every month, we take a moment to share the expertise of our team, and answer a number of great questions we’ve received from both our customers and open source users. These questions range from how

Protecting SSL Private Keys in NGINX with HashiCorp Vault

In the first post in this series, we describe several approaches to improving the security of your SSL private keys. The post finished with a demonstration of a remote password distribution point (PDP) used to

How to Install Memcached (Caching Server) on CentOS 7

Memcached is an open source distributed memory object caching program that allows us to improve and speed up the performance of dynamic web applications by caching data and objects in Memory. Memcached is also used

Privacy: What You Need To Know

Here is how it works. Researcher and social psychologist, Dr. Cazzell (Stanford, Queensland, BYU, Yale), excellently described this in her Behavioral Economics article with the Game of Clue. Here is how it works: When you

How to Setup Two Factor Authentication for SSH on Fedora

Every day there seem to be lots of security breaches reported where our data is at danger. Despite the fact that SSH is a secure way to establish a connection remotely to a Linux system,

How to Generate a CSR (Certificate Signing Request) in Linux

SSL Certificates fall into two broad categories: 1) Self-Signed Certificate which is an identity certificate that is signed by the same entity whose identity it certifies-on signed with its own private key, and 2) Certificates

How Blockchain Could End Identity Theft on Dark Web

We feel that our personal data is very important and priceless. However, the reality is very different. Stolen credit card information, addresses, phone numbers, social security numbers are sold on the dark web for as

Understanding UFW

I have always been scared of IP tables. If you want to know the reason check out the man page for the same. Though I have heard from many people that IPtables are more robust

How to Check Integrity With AIDE in Fedora

AIDE (Advanced Intrusion Detection Environment) is a program for checking the integrity of a file and directory on any modern Unix-like system. It creates a database of files on the system, and then uses that

Best Password Manager: LastPass vs Dashlane vs Bitwarden vs 1Password

Looking for the best password manager to keep your login credentials safe? If you’re reading this post, you probably don’t need me to tell you that it’s a scary world out there when it comes

How Did Russian Hackers Phish America’s Power Grid?

The kill chain, the phishing attack and the broken trust graph The Wall Street Journal published an explosive story about how state-sponsored Russian hackers used a variety of techniques and a spider web of compromised accounts

5 of the Best Online Cloud Backup Services to Keep Your Data Safe in 2019

Looking for a safe place to back up and store all your digital data? This post will help you get started. Here, we’ll look closely at five of the best online cloud backup services to