Free Rugby World Cup Streaming Service Can Be a Foul Play

The internet is a great source for information and entertainment. But it is also rife with fraud schemes, scams, misinformation, and other tactics to exploit your personal and financial data. Cybercriminals often focus on high-profile global events to find target victims in hopes of stealing their financial data. These criminals Continue Reading

Mautic Community Manifesto

Mautic is an Open Source Project created and driven by DB Hurley, who also founded Mautic Inc. (which was recently acquired by Acquia). To further sharpen the vision for Mautic’s future, there has been a public process to determine the community’s position and express its expectations.  A lot of good Continue Reading

MySQL 8.0.17 Replication Enhancements

MySQL 8.0.17 is out. In addition to fixing a few bugs here and there, we also have a couple of new replication features that I would like to present. Thence, allow me to give you a quick summary. As usual, there shall be follow-up blog posts providing details, so stay Continue Reading

CentOS Web Panel News

How to install TLS for FTP – Control WebPanel Wiki

As now all is moving to https it’s also good to enable SSL/TLS for FTP to protect plain text login credentials.Our instruction will guide you to install and configure pure-ftpd to use SSL/TLS. Requirements: Hostname certificate already installed, check that these files exist:/etc/pki/tls/private/hostname.key/etc/pki/tls/certs/hostname.crt Create Certificate File for pure-ftpd cat /etc/pki/tls/private/hostname.key Continue Reading

Petya’s Master Boot Record Infection

Last week we started our technical analysis on Petya (also called NotPetya) and its so-called “killswitch.” In that blog post we mentioned that Petya looks for a file in the Windows folder that has the same filename (no extension) as itself (for example: C:WindowsPetya). If it exists, it terminates by Continue Reading

Network Security in the Era of the Millennials

One of the toughest gigs in IT is the job of keeping an organization’s network safe. It is also one that is getting tougher with the rise of the millennial generation. Millennials – those in their 20s to mid-30s – are starting to dominate workplaces around the world. More than Continue Reading

Who’s Afraid of the Big, Bad Robot?

Tired of hearing about IoT? Me too. I am also tired of AI and the constant specter of intelligent robots and computers that are smarter than us, and that for some reason want to harm us. I prefer the movie Her because I believe that is more likely to represent the future Continue Reading

Teardown of a Recent Variant of Android/Ztorg (Part 1)

Ztorg, also known as Qysly, is one of those big families of Android malware. It first appeared in April 2015, and now has over 25 variants, some of which are still active in 2017. Yet, there aren’t many technical descriptions for it – except for the initial Ztorg.A sample – so I decided Continue Reading

Token Authentication for Cached Private Content and APIs

While working to make the Internet a better place, we also want to make it easier for our customers to have control of their content and APIs, and who has access to them. Using Cloudflare’s Token Authentication features, customers can implement access control via URL tokens or HTTP request headers Continue Reading

>