How to harden AdwCleaner’s web backend using PHP

More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are often tied to a database backend, and thus need to be properly secured, even though most of the time they are designed to restrict access to authenticated users only. PHP is used to develop…

Read more

Explained: user agent

This post explains the pros and cons of using user agents when browsing the world wide web. What does it reveal and why?

Read more

An Infosec Spring clean

Spring has indeed sprung, but it’s never too late to have a wander through your security settings and features. Unfortunately, we have so many accounts these days that it’s hard to keep track of them all, but this round-up may help you on your way.

Read more

Explained: the Malwarebytes Website Protection module

Learn about the strengths and possible improvements of the Malicious Website Protection module that comes with Malwarebytes Premium.

Read more

The official Dido website: “Cheap flower delivery”

Why is a singer’s website posting about cheap flower deals on their news section? And what happened to their Tumblr, for that matter…

Read more

Blast from the Past: Blackhole Exploit Kit Resurfaces in Live Attacks

The year is 2015 and a threat actor is using the defunct Blackhole exploit kit in active drive-by download campaigns via compromised websites.

Read more

Fake Daily Mirror Site offers “Facebook Social Media Profits Program”

Fake news sites are often used as bait for signups, offers and deals. Here’s a combo of fake news, Facebook and more.

Read more

SSL Malvertising Campaign Continues (UPDATED)

The Angler exploit kit is served to visitors to top websites via the SSL malvertising campaign.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language