Security

Image: Instagram hacked? Here’s what to doBrian A JacksonShut­ter­stock

Instagram hacked? Here’s what to do

As social networks grow, so does the risk of hacking. With so many private photos shared, Instagram hacked cases are in­creas­ing­ly common – often because attackers try to blackmail account owners. This guide shows you how to recover an Instagram account that’s been hacked and how…

Read more
Image: Facebook account hacked? How to get your account backBrian A JacksonShut­ter­stock

Facebook account hacked? How to get your account back

Rising cy­ber­crime is also becoming in­creas­ing­ly evident on social networks. Platforms like Facebook are deeply in­te­grat­ed into both personal and pro­fes­sion­al life, making them at­trac­tive targets due to the large amount of personal data they contain. Learn what to do if your…

Read more
Image: What is DMARC and how can you set it up?TierneyMJTierneyMJ

What is DMARC and how can you set it up?

How can you recognize fraud­u­lent emails when they appear to come from trusted senders? DMARC helps identify fake messages and au­to­mat­i­cal­ly takes action when a message fails au­then­ti­ca­tion. It adds an important layer of pro­tec­tion against phishing, spoofing and other forms of…

Read more
Image: How do you convert a website to HTTPS (SSL)?Bakhtiar ZeinShut­ter­stock

How do you convert a website to HTTPS (SSL)?

Data security is becoming in­creas­ing­ly important in both private and pro­fes­sion­al settings. As a website owner, you should take all necessary pre­cau­tions to make visits to your site as secure as possible and ensure risk-free data trans­mis­sion. By con­vert­ing your website to HTTPS,…

Read more
Image: How to encrypt and sign your emails with S/MIMEVictor MoussaShut­ter­stock

How to encrypt and sign your emails with S/MIME

Sending an email without extra security is akin to sending a postcard: If every­thing goes as expected, the message arrives intact and unread by anyone else. But if the postcard or email is in­ter­cept­ed during transit, the content can be read or altered freely. Discover how the…

Read more
Image: How to use two-factor authentication to protect your accountji­jo­math­aidesign­ersshut­ter­stock

How to use two-factor au­then­ti­ca­tion to protect your account

With two-factor au­then­ti­ca­tion, accounts can be ef­fec­tive­ly protected against hacking or phishing attacks. Since more than just a password is needed for login, internet criminals can’t do much with in­ter­cept­ed login details. In our guide, we explain how two-factor au­then­ti­ca­tion…

Read more
Image: How to encypt your emails with SSL/TLSTierneyMJShut­ter­stock

How to encypt your emails with SSL/TLS

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by en­crypt­ing the trans­mis­sion and content of emails can you ensure that your data is secure while being sent. Otherwise, unau­tho­rized persons can read your email traffic easily and…

Read more
Image: How to reset MySQL/MariaDB root passwordREDPIXEL.PLshut­ter­stock

How to reset MySQL/MariaDB root password

For­get­ting the root password in MySQL or MariaDB doesn’t need to become a serious issue. By following the right steps, you can reset a MySQL/MariaDB root password quickly and easily at any time. This dedicated guide walks you step by step through both methods and points out what…

Read more
Image: What is reverse domain hijacking? Definition and protective measuresPayless Images, Inc.Shut­ter­stock

What is reverse domain hijacking? De­f­i­n­i­tion and pro­tec­tive measures

The rights to domain names are often hotly contested. While companies defend them­selves against cy­ber­squat­ting, there’s also the opposite case, known as reverse domain hijacking. This is when trademark owners attempt to mis­ap­pro­pri­ate domains, often using legal tricks and…

Read more
Image: What is StartTLS? How it works, uses, and security risksMarkus MainkaShut­ter­stock

What is StartTLS? How it works, uses, and security risks

StartTLS initiates the en­cryp­tion of an email using the TLS protocol and is con­ve­nient because, if the method is accepted, the en­cryp­tion occurs au­to­mat­i­cal­ly. There’s no need to contact a dedicated port; StartTLS can be easily in­te­grat­ed into normal op­er­a­tions. However, this…

Read more