by ray | Feb 13, 2015 | Security
Article by Thorin Klosowski Shellshock, the newly discovered vulnerability that allows attackers to inject code into your machine, puts your Mac or Linux at a serious risk for malicious attacks. Here’s how to test if your machine is vulnerable. Shellshock uses a...
by ray | Feb 13, 2015 | Security, Wordpress
Article by Lisa Hoover McGreevy WordPress has struggled in recent weeks with a spate of security issues ranging from malware infections to denial-of-service vulnerabilities. It’s not a big surprise then that Automattic, the open source development company behind...
by ray | Feb 10, 2015 | Security, Wordpress
Article by Sean Michael Kerner In a continuing effort to secure hundreds of millions of users, WordPress.com is disconnecting self-hosted sites that haven’t updated the Jetpack add-on. The risk of unpatched software is one that WordPress understands well and is...
by ray | Feb 7, 2015 | Security, Tech News
Article by Tom Scearce Over the past few years, public cloud services have changed the way consumers and businesses think about files. For consumers, apps such as Dropbox make it easy and fun to store and share files with friends and family. At work, these services...
by ray | Feb 7, 2015 | Security
Article by Istvan Lam Every other week there is a new high-profile data breach in the media. From Target to Home Depot to iCloud to JPMorgan to Snapchat to the White House—and most recently the devastating attack on Sony Pictures Entertainment—there’s always a...
by ray | Feb 7, 2015 | Security
Article by Jennifer Openshaw This week’s hijacking of several social-media accounts run by U.S. Military Central Command underscores a powerful message: Just because it wasn’t data or computer networks that were attacked doesn’t mean it’s not detrimental to your...