The web server world is basically a three-way battle between an established giant, Apache, the speedy alternative, Nginx, and IIS, which isn’t used all that much in commercial web hosting. Apache and Nginx are both excellent options, but there are a number of other web servers worth consideration. The leader of the pack among the […]
Towards the end of last year, a managed WordPress hosting provider suffered a serious security breach in which customer credentials were exposed to an attacker. Breaches of this sort are a risk with any online service, but what’s interesting about this breach is that the blame rests squarely on one of the company’s cloud infrastructure […]
If we had to define the biggest theme on 2015 it would be hard to come up with just one, but easy to come up with quite a few. Cybersecurity, the Internet of Things, open source and Linux have all been at the forefront of the tech conversation over the past twelve months. This first roundup of […]
With the announcement of a new vulnerability that could lead to the leaking of OpenSSH clients’ private keys, SSH users should update. All versions of OpenSSH from 5.4 to 7.1 are vulnerable.
Authentication factors are often categorized as something you know, something you have, and something you are. Passwords are the obvious example of something a user knows. In an ideal world, passwords would be something only the user knows, but because password databases are wont to leak, and because users can’t be relied on to choose […]
New Comments