Security

What is DNS Hijacking?

DNS Hijacking: When the Domain Name System becomes a security risk

Technically, the Domain Name System (DNS) is a good thing because it allows you to access a website using its URL rather than its IP address. The domain address is then automatically interpreted as an IP address – thanks to the DNS. But despite these performance benefits, the system carries a significant risk: DNS Hijacking. The practice is simple: a hacker accesses a user’s device configuration...

PHP 7.1

PHP 7.1 EOL - support is expiring

PHP 7.1 has many fans in the web developer community. But now it's time to say goodbye and switch to a newer version. The development team has set the end-of-life date for PHP 7.1 for the 1st of December, 2019. From that date on, the version will receive no further updates. Even security gaps will no longer be closed by the official developers. What should you do now?

Gain users’ confidence with a privacy policy

Getting a privacy policy for your website

An important part of a website that many operators underestimate is the privacy policy. This notifies the site visitors what information they are disclosing about themselves and what this data will be used for. But what kind of information should this declaration contain and what has changed since the new General Data Protection Regulation law and the Data Protection Act 2018?

Two factor authentication: Protection for your accounts

Two factor authentication: How to protect your accounts

Poorly secured accounts on the web have repeatedly led thousands of people to become victims of hacking or phishing attacks and lose control of their accounts. With a two factor authentication, accounts can effectively be protected against such cases. Because more than just a password is required for log-in, internet criminals can’t do much with the spied credentials. Here, we explain how two...

Client to Authenticator Protocol (CTAP)

CTAP: A protocol for more security & convenience on the web

Try and imagine a world where you don’t have to memorise passwords: Thanks to FIDO2, this could soon become a reality. Authentication in online shops or for online banking can be done through a fingerprint or hardware token. The latter can communicate with laptops of PCs through a USB, NFC or Bluetooth. To enable conversations between two devices, FIDO2 uses the Client to Authenticator Protocol...

Social engineering – the security gap at ‘layer 8’

Social engineering: human vulnerability exploited

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

The best online backup services

Comparing the best online backup services

Many people use several devices and have data stored on them. What should you do if your data carrier fails or the data gets lost? Backing up data is extremely important and an online backup makes perfect sense. By doing this, you don’t risk losing your important files due to a system crash or criminal activitiy. What is the best option? Here is a comparison of online backup service providers.

TOTP

Time-based one-time password: TOTP explained

Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?

Password Protect ZIP Files

Encrypting ZIP Files: How to Password Protect Your ZIP Files

The ZIP format enables you to combine multiple files or entire directory trees in a compressed container file. This not only saves hard drive space when archiving; ZIP files can also be password protected, if required, to safeguard archived content from third-party access. We show you how to do this.

WLAN security: the best protection for your network

WLAN security: how to make your wireless network into a fortress

When you’re travelling with portable devices, you’ll find public WLAN everywhere, giving you access to the world wide web. Even in residential and work spaces, practical wireless networking is widespread. It’s easy to forget that there’s a risk involved when transferring data using one of these access points. In the following article, we explain the biggest security risks and show you how to make...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 month for £1/1st year
then £10/year