Category: Security

Keeping safe

Tomb – A File Encryption and Personal Backup Tool for Linux

Tomb is a free open source, small, powerful and simple tool for encrypting files on GNU/Linux. At the time of this writing, it comprises of a shell script (zsh) using generic filesystem GNU tools...

Magecart 2.0: Architecture of a What-If

This case study was developed by Jscrambler’s Research team. During the past few weeks, we’ve been seeing an alarming number of attacks targeting several eCommerce and ticketing companies, stealing their clients’ credit card data. Behind these

Redirecting all variants of your domain to https Version

Assuming that I have a domain example.com I would like to redirect all the variations of this domain to the https version. There can be six variationsexample.com, www.example.com, http://example.com, http://www.example.com, https://example.com, https://www.example.com. I want to

Are Dating Apps Killing Romance?

Swipe, swipe, swipe, swipe… This sums up dating apps today. Endless swiping leading to a few matches, then less matches you decide to have a meaningful conversation with and eventually one or two people you

Managing Multi-User Access In Your Hosting Account

If you operate a business or manage large projects you know how important a multi-user environment can be. In this post I’d like to give some …

The post Managing Multi-User Access In Your Hosting Account appeared first on Kinsta Managed WordPress Hosting.

WPScan – A Black Box WordPress Vulnerability Scanner

WordPress is all over the web; it’s the most popular and most used content management system (CMS) out there. Is your website or blog is powered by WordPress? Did you know that malicious hackers are

Install and Configure ConfigServer Security & Firewall (CSF) in Linux

If you look at IT-related job postings anywhere, you will notice a steady demand for security pros. This does not only mean that cybersecurity is an interesting field of study, but also a very...

Malware Analysis using Osquery | Part 2

In the first part of this series, we saw how you can use Osquery to analyze and extract valuable information about malware’s behavior. In that post, we followed the activity of the known Emotet loader,

Is WordPress Secure? Here’s What the Data Says

WordPress is, by far, the most popular way to build a website. That popularity has the unfortunate side effect of also making WordPress sites a juicy …

The post Is WordPress Secure? Here’s What the Data Says appeared first on Kinsta Managed WordPress Hosting.

InfoSec Career Paths vs Programming Skills — The Basics

Image from https://www.2-sec.com/2017/08/day-life-2-sec-penetration-tester/ I’ve recently was asked for a numerous time?—?“Is being a great developer vital when choosing information security as a professional career?”, so I decided to write a more in-depth answer to the

How to Fix Your Connection is Not Private Error in Chrome (16 Tips)

Kinsta works with thousands of different WordPress sites on a daily basis, so when it comes to different types of errors, we’ve pretty much seen it …

The post How to Fix Your Connection is Not Private Error in Chrome (16 Tips) appeared first on Kinsta Managed WordPress Hosting.

Entering God Mode — The Kernel Space Mirroring Attack

How Alibaba are researching using the hardware features of ARM MMU to enable God Mode in Android 8 terminals Wang Yong, a.k.a. Thomas King, is a researcher from Alibaba Security’s Pandora Lab. The lab focuses

Universal Logon Framework: Another Blockchain Technology Disruption

The world as we see it today has no doubts become digitized. Nearly almost all transactions are carried out online. From booking an airplane ticket, international money transfers to ordering for foods and even booking

5 Tools to Scan a Linux Server for Malware and Rootkits

There are constant level of high attacks and port scans on Linux servers all the time, while a properly configured firewall and regular security system updates adds a extra layer to keep the system...

How to Set up Sucuri Firewall (WAF) on Your WordPress Site

Bot traffic is higher than it’s ever been. According to Distil Networks, in 2017, bad bots accounted for 21.8% of all website traffic, a 9.5% increase …

The post How to Set up Sucuri Firewall (WAF) on Your WordPress Site appeared first on Kinsta Managed WordPress Hosting.

6 Key Steps to Ensure GDPR Compliance – The Steps You Need to Take Right Away

Not everyone can be a GDPR compliance specialist, but that doesn’t mean you should ignore data protection and privacy; especially if you run a business. Even though much talk has been made of the May 2018 deadline for GDPR compliance, being GDPR-ready is not a one-time project. It’s an ongoing approach to business. Some consultants we talked to say that there is no such thing

Cryptmount – A Utility to Create Encrypted Filesystems in Linux

Cryptmount is a powerful utility which allows any user to access encrypted filesystems on-demand under GNU/Linux systems without requiring root privileges. It requires Linux 2.6 or higher. It handles both encrypted partitions as well...

How to Change FTP Port in Linux

FTP or File Transfer Protocol is one of the oldest network protocol used today as standard file transfers over computer networks. FTP protocol uses the standard port 21/TCP as command port. Although, there are...

How to Block Ping ICMP Requests to Linux Systems

Some system administrators often block ICMP messages to their servers in order to hide the Linux boxes to outside world on rough networks or to prevent some kind of IP flooding and denial of...