Submit your search
2022-10-20
Securing Apache2 with ModSecurity

ModSecurity is a free and open source web application that started out as an Apache module and grew to a fully-fledged web application firewall. It works by inspecting requests sent to the web server in real time against a predefined rule set, preventing typical web application attacks like XSS and SQL Injection. Install ModSecurity ModSecurity […]

Read More
2022-10-18
How to configure automated security updates on Linux

Keeping your system up-to-date with the latest packages and security updates can be a tedious task. Most users forget to do it, leaving them vulnerable to countless threats. Automate security (and other package) updates with the utility Unattended Upgrades on Debian or Ubuntu. You can set up automated security updates on Linux by installing a […]

Read More
2022-10-16
How to avoid FOMO in crypto trading

FOMO stands for Fear Of Missing Out. It is a common problem faced by both experienced and beginner traders alike. It is also one of the worst emotions to deal with in crypto trading and life in general. FOMO can cause you to make ill-advised decisions like investing in a suspicious projects. In this article, […]

Read More
2022-10-10
Create custom signatures for ClamAV

Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX. It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates.  CVD (ClamAV Virus Database) is a digitally signed container that includes signature databases in various text formats. Hash-based signatures The easiest […]

Read More
2022-10-09
Vulnerabilities in Cross-chain Bridge Protocols Emerge as Top Security Risk

Following exploit of the Nomad Bridge, Chainalysis estimates that $2 billion in cryptocurrency has been stolen across 13 separate cross-chain bridge hacks, the majority of which was stolen this year. Attacks on bridges account for 69% of total funds stolen in 2022 so far. This represents a significant threat to building trust in blockchain technology. […]

Read More
2022-10-08
Common scams on mobile devices

2017 was a remarkable year for the cryptocurrency industry as their rapid increase in valuations propelled them into mainstream media. Unsurprisingly, this garnered them immense interest from both the general public as well as cybercriminals. The relative anonymity offered by cryptocurrencies has made them a favorite amongst criminals who often use them to bypass traditional […]

Read More
1 9 10 11 12 13 18

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram