How to harden AdwCleaner’s web backend using PHP

More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are often tied to a database backend, and thus need to be properly secured, even though most of the time they are designed to restrict access to authenticated users only. PHP is used to develop…

Read more

Why emerging APAC markets are prime targets for the malware of the future

Cybercriminal activity continues to be heavily targeted toward the US and Europe. But emerging APAC markets are even more susceptible to malware attack. Here’s why.

Read more

When cybersecurity isn’t all cyber: What does it really take to work in cybersecurity?

Although lucrative and future-proof, being part of the cybersecurity workforce doesn’t just require one to be knowledgeable about code, network topologies, or social engineering tactics. People are still the most critical part of a business’s security process.

Read more

How to create an intentional culture of security

A culture of security in the workplace has always existed; it just may be unrecognized, weak, or inconsistent. How can businesses get employees to accept and champion an intentional culture of security? And why should they? We’ll show you how.

Read more

Release the KRACKen: flaw in Wi-Fi security leaves users vulnerable

A serious flaw in the wireless protocol that secures all modern protected Wi-Fi networks has been discovered. If your device supports Wi-Fi, it is most likely affected. This feasible attack, dubbed KRACK, could abuse design or implementation flaws in the Wi-Fi standard, not some specific hardware. 

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language