Security

The best PayPal alternative

The best PayPal alternative

The conveniences of online retail have helped the sector gradually chip off traditional retailer’s market share over the past decade. Fast, easy, and secure payment methods have contributed to the rise of this sector. Until recently, online payment systems have been heavily dominated by one industry heavyweight: PayPal. But not everyone’s enthused by this payment method, having been criticized for...

General Data Protection Regulation: New rules for businesses

General Data Protection Regulation: New rules for businesses

On 25 May 2018 a new European law on data protection came into place. However, many companies and website operators are still unprepared for the new General Data Protection Regulation (GDPR) despite it being relevant to their day-to-day business. On top of this, high fines will be imposed for those violating the regulations. Here we summarize everything worth knowing on the new EU GDPR for...

Chrome Updates

Chrome Updates

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasizing user safety on the internet, a not entirely selfless strategy from Google. In this guide, we will explain what changes will be made, why they are happening, and how you can prepare your website...

Two factor authentication: Protection for your accounts

Two factor authentication: Protection for your accounts

Poorly secured accounts on the web have repeatedly led thousands of people to become victims of hacking or phishing attacks and lose control of their accounts. With a two factor authentication, accounts can effectively be protected against such cases. Because more than just a password is required for log-in, internet criminals can’t do much with the spied credentials. Here, we explain how two...

Using SSH keys for your network connection

Using SSH keys for your network connection

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: an overview of attack patterns

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Brute force attack: definition and protective measures

Brute force attack: definition and protective measures

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

Gain users’ confidence with a privacy policy

Gain users’ confidence with a privacy policy

Website owners often underestimate the importance of privacy policies, but they are essential for clarifying what kind of user data the website collects, and what happens with it. But is a privacy policy essential for your website, and if so, what details should it include?

Rainbow tables

Rainbow tables

Rainbow tables: they may sound innocent, but they’re actually a strong attack method for cybercriminals. Using rainbow tables, you can find out specific passwords in just a few seconds. To protect yourself and your users from such attacks, you should understand how the tables function. We explain rainbow tables using an example.

How do I convert my site to SSL and HTTPS?

How do I convert my site to SSL and HTTPS?

The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting from HTTP to HTTPS or SSL is an important step in securing your website and gaining your customers’ trust.