What is Two Factor Authentication
An extra layer of security that is known as "multi factor authentication" In today's world of increasing digital crime and internet fraud...
Finding a Zero-Day Exploit
Zero-days are found in exactly the same ways as any other kind of hole. What makes a security hole a "zero day" relies exclusively on who...
Instagram's Biggest Security Flaw
Stevie Graham, a security researcher who reported an authentication flaw in Instagram’s iOS software a few days ago, was denied a bug...
Security Checklist: Have you been hacked?
Action List Take your website offline (We recommend the htaccess method) Scan all machines with FTP, super admin, and admin access for...