SSL Within the Context of Website Security

There is a common misconception that if someone adds SSL (Secure Sockets Layer) to their blog site or company website then it will protect them from cyber crimes. SSL only protects the data of the client who uses the website. Other than providing protection for website visitors’ data, SSL does not in fact make a website secure.

To understand why, let’s unpack what SSL is and how it impacts your websites’ security.

What is SSL?

Continue reading SSL Within the Context of Website Security at Sucuri Blog.

5 Tips for Long-Term Remote Workers

 

If you’ve just started remote working, are remote-curious, or are transitioning into a permanently remote position, these tips can help you find success working from home. If you are a remote-work veteran, you might learn a thing or two as well.

Why This Trend will Outlive the Pandemic

Because of the COVID-19 pandemic, many companies have found themselves in the middle of an involuntary experiment with remote work. What was not expected were the results. 

Continue reading 5 Tips for Long-Term Remote Workers at Sucuri Blog.

What is Cryptocurrency Mining Malware?

Cryptocurrency mining malware is typically a stealthy malware that farms the resources on a system (computers, smartphones, and other electronic devices connected to the internet) to generate revenue for the cyber criminals controlling it. 

Instead of using video game consoles or graphics card farms, these particular cryptominers are using the computers and servers of the people around them for their processing power – without permission. This type of malware mines cryptocurrencies on the systems of their targets or even steals cryptocurrency from other targets, using its resources in such a way that the owner wouldn’t know.

Continue reading What is Cryptocurrency Mining Malware? at Sucuri Blog.

What is Cryptocurrency?

Cryptocurrency is best thought of as a digital currency that only exists on computers. It is transferred between peers (there is no middleman like a bank). Transactions are then recorded on a digital public ledger called the “blockchain”.

Transaction data and the ledger are encrypted using cryptography. That is why it is called “crypto” “currency”.

Cryptocurrency Main Features

Let’s dig into how cryptocurrency works.

Decentralized and Distributed

Cryptocurrencies are decentralized and distributed.

Continue reading What is Cryptocurrency? at Sucuri Blog.

5 Types of Hackers & Why They Hack

When considering why hackers are attacking websites, you might think that there’s a specific reason they target you as a website owner—your business, your reputation, or your information. The truth is, while it feels personal to the victim, hackers rarely single out specific targets. Most of the time, hackers perform mass searches for specific vulnerabilities, and target these sites collectively.

Before we look at the psychology behind website hacks, we should first break our hackers out into groups based on their motivations.

Continue reading 5 Types of Hackers & Why They Hack at Sucuri Blog.

Pin It on Pinterest