Skip to main content
WordPress Security Basics

WordPress Security Basics

WordPress has the largest market share. This success makes it an attractive target for hackers. The number of hacks carried out using vulnerabilities in the latest versions of this CMS is relatively small. WordPress sites are hacked mostly through vulnerabilities related to plugins, themes, hosting services, and users.

David Balaban
David Balaban
56
XXI century cybercrime stats and what to expect in the 2020s

XXI century cybercrime stats and what to expect in the 2020s

It is believed that a look back on the past can give valuable clues on what the future holds. How about applying this theory to cybercrime? From phishing and ransomware to mobile malware and cryptojacking, this century has already become a cradle of deleterious phenomena in this arena. This article encompasses some of the key cybercrime stats to date and outlines the top challenges that will likely emerge in the 2020s.

David Balaban
David Balaban
463
Remove fuq.com virus on Mac/iPhone and stop FuQ redirects in Safari/Chrome/Firefox

Remove fuq.com virus on Mac/iPhone and stop FuQ redirects in Safari/Chrome/Firefox

Adware and browser hijacking is not uncommon on Mac OS X, although Windows fares much worse in regards to the exposure of users to these threats. One way or another, there are online infections with cross-platform functionality that affect both of these major operating systems. One of these pests is fuq.com. It is an adult site, and it may seem that visiting it or not is up to the user. However, some people are automatically redirected to this page off and on, which is an outcome of a compromise on a Mac machine.

John Dee
John Dee
25.8K
How to remove “Your Apple iPhone is infected” virus popups

How to remove “Your Apple iPhone is infected” virus popups

Affiliate marketing is a great thing that bridges the gap between software publishers and buyers. Unfortunately, this industry is susceptible to abuse by malicious actors who seek to earn commissions in an unethical way. This is the kind of exploitation seen in a malvertising campaign that involves deceptive popup ads saying “Your Apple iPhone is infected” to push VPN tools for iOS or macOS devices.

John Dee
John Dee
4.0K
Remove store@apple.com / finegold404@outlook.com fake email scam

Remove store@apple.com / finegold404@outlook.com fake email scam

Frauds are nothing new on the Apple arena. No wonder – fooling humans is easier than manipulating the thoroughly secured operating system. These campaigns can be much trickier than simply hoodwinking the recipients into clicking something sketchy. The online con artists might even spoof the email address and make it appear entirely legitimate, as is the case with the store@apple.com scam.

John Dee
John Dee
642
Top browsers for anonymous web surfing

Top browsers for anonymous web surfing

The browser you use knows a lot about you and provides this information to its owner and visited sites if you allow it. However, there are special web browsers that are designed to protect your data and make Internet surfing as secure as possible. This article presents several well-known web browsers that will help you stay online incognito, let's take a look at them. Anonymous web browser is an important part of Internet security.

John Dee
John Dee
557