Uncategorized

No Image

Solved the problem with the WordPress Editor writing white text on white background

If you google, you will see tips to deactivate plugins and add all kind of things in the config files. In my case, when I upgraded from WordPress 3.8 to 4.0, I started to have this problem. I deactivated the “Hello Dolly” plugin and everything worked perfectly!

Read More

No Image

VirusBulletin.com: Cyber insurance, is it for you?

This article was published first in Virus Bulletin. Sorin Mustaca looks at how companies trading online can insure the risks they run. Throughout its 25 year history, Virus Bulletin has regularly published technical analyses of the latest threats and defensive methods, and will continue to do so (with the material now available free of charge). We will also continue to post thought-provoking opinions from security experts, to encourage debate and discussion. Today, we publish a guest blog by Sorin Mustaca. Sorin is well known to many in the industry and has regularly written for VB. In this post, he looks at the topic of cyber insurance. Introduction If you own a car, you probably have car insurance, and if you own a house, you will have several kinds of insurance against almost any kind of damage that can affect your property – insurance against theft of items in your property, insurance against damage by flood, fire or accidental damage, and so on. Meanwhile, in various professions it is mandatory to have specialized insurance cover to protect customers against damage through negligence or failure to provide the appropriate level of service. But what about a company’s digital assets? Or the private customer data that is stored…



No Image

How to have an overview of the IT Security News posts

The website ITSecurityNews.org publishes between 15-100 posts per day from the sources mentioned under SOURCES. IT Security News can be obtained on these channels: – Website: http://www.itsecuritynews.info and RSS feed http://www.itsecuritynews.info/feed – Google+:  https://google.com/+ItsecuritynewsInfo – Facebook: https://www.facebook.com/ITSecNewsInfo – Twitter: https://twitter.com/It_securitynews   If you want, you can even subscribe to the posts via email: Just subscribe on the page where you see this: SUBSCRIBE TO BLOG VIA EMAIL.   The most interesting ways of having an overview over the posts are: – tweets published on @It_securitynews are available in the daily digest of tweets. They can be viewed here. http://itsecuritynews.info/category/daily-digest/. – Weekly archive digest available here: WEEKLY ARCHIVE    


No Image

Article in ComputerFraudandSecurity.com: Are your IT professionals prepared for the challenges to come?

  Article published in : ComputerFraudandSecurity.com   Are your IT professionals prepared for the challenges to come? Three key security threats that you need to prepared for and how to mitigate them.   The IT is probably the most dynamic business sector these days. There are so many things happening all the time and the risks are so high, that even a relatively insignificant event can have dramatic consequences for an enterprise. This is why it has become more important than ever for the IT administrators to understand the risks and to be able to prioritize which risks are mitigated first. Below you can find which are the most critical security topics which will make in the near future the lives of IT security professionals a more complicated than ever before. Ransom malware   The year 2013 was also the year of the ransomware. We have seen many methods that this malware used to scare the victims:  using children pornography,  encrypting files, using P2P networks. Probably the most famous of all ransomware is the Cryptolocker – a new variant of this type of malware that encrypts various files on user’s computer and demands the owner of the computer to pay the…


No Image

Facebook, WhatsApp and the new Internet bubble

I was reading the great news about the 19 billion USD which Facebook paid for WhatsApp. I want to underline, that 1 year ago, Google wanted to buy it for… 1 billion USD: http://venturebeat.com/2013/04/08/as-google-acquisition-rumors-grow-is-whatsapp-really-worth-a-billion-dollars/ And in December 2013, http://blogs.wsj.com/digits/2013/12/19/whatsapp-hits-400-million-users-wants-to-stay-independent/ WhatsApp has “no plans to sell, IPO, exit, [get new] funding,” Koum said. “Despite the fact that we’re able to monetize today, we’re not focused on monetization,” Koum said. “We view monetization as five, 10 years down the road. We’re trying to build a sustainable company that’s here for the next 100 years.” Koum said WhatsApp has attracted new users without spending on marketing.   I found some articles which say something like: The huge price tag attached to Facebook’s purchase of WhatsApp — one of the largest web deals in history — actually makes more sense than you might think at first glance.   What? No company is so much worth! And especially not an instant messaging company. Some facts:(read here the details). – the company is 5 years old – it has 450 million users. – It has 400 Million active monthly users   – July 2013 it had 200 million active monthly users – 100 M from them joined in the last…



No Image

When the Internet fails on you – IFTTT.com failure

My entire automatic posting on ITSecurityNews.info which is retweeted on @ITSecurityNews, @SorinMustaca and @sorinm_security is built on IFTTT.com. Well, this is why you didn’t get some tweets on time: Last night at approximately 10:00pm PST much of the work IFTTT does in the background stopped due to an issue with one of our backend services. Our monitoring systems would have alerted us to the problem immediately, but those unfortunately failed as well and we weren’t able to fix the issue until this morning at 10:00am PST. This is what I received from CEO of IFTTT, Linden Tibbets, a few moments ago. I see that now the posts are starting to come slowly, but I guess I missed a few hundred posts. Let’s see if they come back.   Does anyone know any good tool to repost in WordPress complete articles from an RSS feed?  


No Image

Duplicati: How to create your own secure online backup for free

One thing that almost all online backup solutions (e.g.. Dropbox, CX, Memopal, etc.) have in common is that they don’t allow the user to store encrypted files on their storage. They encrypt the connection from user’s computer to the cloud service, but once the files are there, they will be stored either unencrypted or encrypted with a key that the service provider has. This practice allows the provider to index the files and check their checksum. Once a file has a known checksum (usually SHA1) it will no longer be uploaded to the storage, it will be only referenced, in order to spare some space. Although this allows the provider to massively optimize the storage, this has a major drawback: zero privacy for the user. If somebody hacks the storage (see Dropbox’s privacy problems in the past) then your files will be available unencrypted to the attacker. In the light of the NSA surveillance, this means that they can get their hands on your files without any problem at all. In the last two years it seems that the problem started to be solved by some providers (e.g. Wuala) which saw the opportunity and offered upload of the files which…


No Image

Information security in the Social Media age

A company doesn’t exist anymore if it is not present on at least a few social media platforms. Depending on the area they are active, they could go for average consumer or for highly skilled professionals. In order to address their customers, they need to use one or another social media platform. However, the tendency is that nowadays the average consumer is seen as a potential professional or at least someone who can bring the company’s name in his or her workplace. Even if we are speaking about Facebook, Twitter, Pinterest, MySpace or professional networks like LinkedIn or Xing, the users are confronted with the same issues. In this article I assume that no matter which social media platform you’re using, the challenges and associated risks to use it are the same. These symptoms and the risks are, unfortunately, the effect of a society which has woken up suddenly (in less than a generation) in a world full of always connected devices, in-the-cloud services and platforms that try to collect and manipulate huge amount of information. This information comes from the users who are more than glad to share information, but doing this without understanding  the limit between friendly sharing…


%d bloggers like this:

By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close