Cyber Security

Download #CyberSecurity Terminology Booklet

Sometimes information security can be confusing. Even some of the terms themselves can easily be misunderstood. To help, we have created a list of the most commonly used information security awareness terms and what they mean in simple English. Scott Schober, BVS CEO & Cyber Security Expert, has assembled a list of common cyber security terms.  which NexxyTech took a step further in breaking down the Terms into a more

Protect Yourself From Social Media Scams

In addition to protecting yourself against hackers, however, you need to guard against scammers who target social media users. Here are eight ways to avoid scams on social media: 1. Watch out for scam giveaways, contests, and surveys. Criminals sometimes offer “free gift cards” or “amazing discount coupons” under the guise of bringing business to a particular venue, or offer some reward in exchange for completing a survey. These are scams

HACKISM: How Attackers Gain Access to WordPress Sites

In today’s post we dive into some very interesting data we gathered a couple of weeks ago in a survey, letting the facts tell us what matters most. The question we asked in the survey was: If you know how your site was compromised please describe how the attackers gained access. The answers were free form text, so we manually categorized the answers. If the respondent expressed any doubt in

Cyber Forensic Investigation: Do It Yourself Here.

A Forensic investigation helps the organisation collecting and analyzing the data as evidence. The data collected by forensic investigation can be used as a proof in a court. Because of this, data must be protected in a safe way and needs to be prevented  from modification. What do you mean by forensic investigation? Forensic investigation means to analyse the data from the computer and collect it as a proof if

HEIST: Private Website Data Security

Two Security researchers Mathy Vanhoef and Tom Van Goethem explained their finding in Black Hat Conference this week. HEIST is defined as (HTTP Encrypted Information can be Stolen Through TCP-Windows) Compression-based attacks such as CRIME and BREACH can now be performed purely in the browser, by any malicious website or script, without requiring network access,” the researchers said in the paper. “If we know that HTTP/2 is used, we can let

Does HTTPS Make Your Website More Secure?

Back in 2014 when Google announced that HTTPS would become a ranking signal, many website and web application owners made the jump from HTTP to HTTPS in search of a small rankings edge. Along with a push to have more sites implement HTTPS came an increase in the use of language related to web application security. Many people began to incorrectly associate HTTPS with a website or web application that was more secure. In this