Top Secret Servers. Since 2009.

Blog

Keylogging Malware Infects More Than 5,000 WordPress Sites

The cloudflare.solutions domain has been taken down after infecting thousands of WordPress sites with cryptocurrency mining and keylogging malware posing as script from trusted web services, according to a Sucuri blog post. The malware had infected at least 5,492 WordPress sites, SC Magazine reports. The keylogging malware was added to malware distributed from fake Cloudflare […]

Internet Freedom Under Global Attack: Report

Internet freedom has declined for a seventh consecutive year, with manipulation of democratic processes through social media, restrictions on VPNs, attacks on netizens and journalists, mobile connectivity shutdowns, and other worrying trends, according to the 2017 Freedom on the Internet report. Freedom House released the annual report with contributions from the Internet Society (ISOC) on […]

Cyberattacks Cost Big Businesses $1.3 Million in 2017

The cost of cyberattacks on large businesses in North America increased to an average of $1.3 million in 2017, according to research released this week by Kaspersky Labs. The report IT Security: cost-center or strategic investment? shows the share of global IT budgets going to security rose from 17 percent (16 percent in North America) […]

Russian parliament bans use of proxy Internet services, VPNs

Russia’s parliament has outlawed the use of virtual private networks, or VPNs, and other Internet proxy services, citing concerns about the spread of extremist materials. The State Duma on Friday unanimously passed a bill that would oblige Internet providers to block websites that offer VPN services. Many Russians use VPNs to access blocked content by […]

CIA Firmware Hacked Popular Wireless Routers Since 2007

For the past decade, the CIA has been able to infiltrate scores of models of wireless routers, gaining access to connected devices from which agents could copy Internet traffic, steal passwords or redirect unwitting users to other sites. Existence of the so-called “Cherry Blossom” firmware modification program is alleged in the latest dump of purportedly […]

WordPress Fixes Security Flaw that Opened Users to Content Injection Attacks

WordPress waited to disclose a REST API Endpoint bug that made sites using WordPress 4.7 and 4.7.1 vulnerable to content injection attacks in order to protect the sites while a security fix was rolled out in WordPress 4.7.2, according to a blog post published Wednesday by WordPress Core Contributor Aaron Campbell. Sucuri security researcher Marc-Alexandre […]

Space: the Ultimate Network Edge

A breakthrough technology developed initially for defense purposes and later commercialized for civilian use is a familiar cadence. One of the most recent examples is free-space optics – a way to use lasers instead of fiber-optic cables to transmit data. Wide adoption of self-driving cars is on the horizon; industrial manufacturers are quickly moving toward […]

NGINX Gains Market Share in August’s Web Server Survey

Netcraft’s August 2016 Web Server Survey, released this week, shows significant losses in market share for Apache, while NGINX boosted its market share nearly across the board. Part of the boost for NGINX comes from the Tengine web server it powers for Chinese ecommerce giant Taobao, which gained over 200,000 active websites between them in […]

Slow Waning of the Enterprise Data Center, in Numbers

While enterprise data centers aren’t going away completely any time soon, the amount of money companies are investing in these facilities and the IT gear they house is declining quickly. More and more workloads are moving to the cloud or into facilities operated by data center providers of various kinds, while corporate IT budgets, with […]

US House Passes Email Privacy Act in 419-0 Vote

The US House of Representatives passed an update to the email privacy act last week in an unanimous vote of 419-0. The bill will now move to the Senate. The bill updates the Electronic Communications Privacy Act (ECPA) of 1986 and closes a loophole that allowed electronic communications to be obtained without a warrant. The […]