Top 5 Ways to Hack into Your Web Application (and how to close those security...
Are you familiar with white hat hacking? If you aren’t, you should be. White hat hacking is a planned attack that checks your systems for vulnerabilities. After the hacker successfully (and harmlessly)...
View ArticleWho Are Your Internet Neighbors?
Do you know who your internet neighbors are? Would you buy a lot, build a house, and move your family in if the next-door neighbor was a notorious drug kingpin? Of course not! It’s important to...
View ArticleCombating SQL Injection Attacks
What is URLScan? URLScan is a free tool provided by Microsoft that restricts certain kinds of HTTP requests that IIS will process. Though there are many different uses of URLScan, today I will only be...
View ArticleStop Using Insecure Passwords Now!
Here are some disturbing statistics: A recent Hotmail security breach revealed that an overwhelming number of users are using predictable, insecure passwords: 61% of passwords were either only...
View ArticleComplimentary Webinar: How Hackers Hack & How to Protect Yourself
Register today for our live PCI DSS Self Defense Webinar: How Hackers Hack & How to Protect Yourself! On May 3rd, INetU Managed Hosting teams up with PCI experts Dr. Anton Chuvakin and Nick Percoco...
View Article6 Steps to Take After Your Server Has Been Compromised
When maintaining a secure server, make sure to take the following precautions: Keep your software up to date, use strong passwords, follow the principal of least privilege and employ defense in depth....
View ArticleMicrosoft Internet Explorer Bug Alert
Microsoft Security Warning Microsoft issued a security warning on Monday of a virus in Internet Explorer. This threat makes PCs vulnerable to attacks by hackers. This bug affects Internet Explorer 9...
View Article
More Pages to Explore .....