Submit your search
2022-05-22
How to set most secure permissions for your website

In Linux, file permissions determine the levels of privilege for file owners and everyone else. It’s important to make sure any web-facing files have their permissions set correctly, so that a compromised process can’t write to places it shouldn’t. Many articles will promote traditional way of setting permissions for your website, but from our experience […]

Read More
2022-05-19
How to set up secure cron job

How do I install or create or edit my own cron jobs? To edit or create your own crontab file, type the following command at the UNIX / Linux shell prompt: crontab -e Do I have to restart cron after changing the crontable file? No. Cron will examine the modification time on all crontabs and […]

Read More
2022-05-15
10 steps to properly secure SSH server

SSH is a secure, encrypted replacement for common login services such as telnet, ftp, rlogin, rsh, and rcp . It is strongly recommended that sites abandon older clear-text login protocols and use SSH to prevent session hijacking and sniffing of sensitive data off the network. Before you start with configuration of SSH, you need to […]

Read More
2022-04-30
Infographic - Crypto scams and how to avoid them

We are presenting new infographic, where most of the popular scams are explained using simple terms, so that any user can benefit from it. Please share with others, so that others will also be aware of scammers tactics. Download infographic crypto-scams.pdf

Read More
2022-04-19
Hackers steal $655K after picking MetaMask seed from iCloud backup

MetaMask, cryptocurrency wallet provider, has sent out a notification to its community warning them that they may be susceptible to ongoing phishing attacks if they make use of Apple iCloud. The security issue for Mac, iPad, and iPhone users relates to the default device settings. These settings store and automatically backup the users’ app data […]

Read More
2022-04-17
Don't feed the Phish!

As you all should know, nowadays phishing is a technique for attempting to acquire sensitive data, such as bank account numbers, crypto wallet details through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person. In this article we will present 5 phishing […]

Read More
1 12 13 14 15 16 18

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram