Category: Hacking Threats

10 Most Common Web Security Vulnerabilities

*This article was originally written by Gergely Karman at TopTal.  For all too many companies, it’s not until after a security breach has occurred that web security best practices become a priority. During my years working as an IT Security professional, I have seen time and time again how obscure the world of web development security issues can be to...

3 Ways to Protect Your User Information From Hacking Attacks

Stealing user information is something that occurs frequently in the hacking scene. Hackers can leverage this sensitive data to gain access to other channels and create further damages. Yahoo experienced a major hacking attack that stole over 500 million users’ information two years ago. The Department of Justice announced today that the usages of stolen user information from Yahoo are...