Archive for the “Security” Category

Historic Hacks – Kevin Mitnick

by Chris Pinnock

This time on historic hacks, rather than concentrating on a specific hack or piece of malware, we’ll be looking at the hacker’s profile. In this case, we’ll be looking at some of the exploits of one of the most famous hackers: Kevin Mitnick. Mitnick started hacking as a teenager. At just 13 years old, he…

What is Public Key Encryption And Why Does It Matter?

by Chris Pinnock

Public key encryption is one of the most used security technologies on the internet. In this post, we provide an overview of what private key encryption is, how it works and why it’s important. How does encryption work? When using encryption, the message being sent is combined with a key in the encryption algorithm. This…

Historic Hacks – The Morris Worm

by Chris Pinnock

Welcome to Historic Hacks, where we’ll be shining a light on some of the more notable hacks in history. Today we’ll be traveling back to the 2nd November 1988, and looking at the Morris worm. The Morris Worm story The Morris Worm was created by Robert Tappan Morris, whose claimed intent was to try to…

Hashing Explained

by Chris Pinnock

When it comes to security, the weakest link in the chain is usually the good old-fashioned password. Hackers often publish tables of usernames and passwords as they find them when breaking into systems, meaning that it’s important to keep the password data secure. Techniques such as ‘hashing’ and ‘salting’ are commonly used in order to…

What Is Encryption?

by Chris Pinnock

In recent years, encryption has become something of a hot topic. Mentions of the word have increased dramatically in light of Edward Snowden’s government surveillance leaks. Security revelations have led to a number of disagreements between governments and businesses over the use of encryption and the public’s access to encryption technologies. So you might be…

GDPR, Consent And You

by Chris Pinnock

You have likely have noticed (unless you have been on another planet over the past year) is that the General Data Protection Regulation came into force in May this year. This is a European Union regulation that affects anyone who handles any information about anyone within the European Union. This makes it a fairly wide-ranging…

Hackers and You – General Tips For Avoiding Hackers

by Chris Pinnock

Welcome to the final part of our series looking at hackers and you. Previously we’ve covered who hackers are and what they do, how to protect your VPS from hackers and what to do if your VPS does get hacked. In this final post, we’ll be looking over some general tips to help you avoid…

Hackers And You – Catching A Hacker And What To Do If Your Server Gets Hacked

by Chris Pinnock

Previously in our series on Hackers and You, we have looked at who hackers are, why they hack, how they go about hacking and what you can to do to try and stop them. Unfortunately, even if armed with all the knowledge and defense in the world, a hacker could still get into your server. So…

What Is Malware? An Overview

by Chris Pinnock

You may hear a lot about malware infection and the dangers of running a server. However, you may also be confused about what this means in real-life terms, or what to do about it. So, let’s find out: when people talk about malware what do they really mean? Malware is an abbreviation of malicious software,…

Hackers And You – What Can You Do To Protect Your Server?

by Chris Pinnock

Welcome back to our series on Hackers and You. Previously we looked at who hackers are, why they hack and how they might go about hacking your server. With that information in mind, this time we’ll look at what you should be doing to protect your server from hackers. User Accounts The first thing to…

over 200,000 servers launched

and counting worldwide...