Prestige Technologies

Recent WordPress Malware Highlights the Need for a Paid Webhost

If you’re on a WordPress site and you saw your search engine traffic suddenly dip to alarming levels, you might want to check if you’ve been using the Revslider plugin on your WP theme, and yes, it was Google that specifically blocked your site. According to recent reports, Google has blacklisted over 11,00 WordPress domains […]

A Quick Look at Mobile Security Development this Year

Since companies and even schools have allowed employees and students to bring their own devices to access online information in their institutions, people have become a bit more concerned about how secure their device operating systems are. After all, an unsecured system can pose a personal threat to, let’s say, someone who has all his […]

Website Tips: Secured Messaging Platforms

If you use Skype, Facebook chat, Whatsapp or any other Instant Messaging platforms on a regular basis, you might want to look for a more secure alternative. It goes double if you actually talk about things that require privacy. This is because the EFF evaluated 39 of the most popular messaging applications to date and […]

How China Censors the Internet and How You can Go Around It

A 2012 report by Freedom House, which is a U.S. organization that tracks global trends in political freedom, has ranked China as the 3rd most restrictive country in the world in terms of internet access, citing that only a small portion of the country’s 560 million internet users are able to browse websites that have […]

The Benefit of Google HTTPS Algorithm for Web Hosting Companies

Google has recently made a statement pointing to a new company outlook that safe websites provide a more secure and better internet on the whole, which means that they will provide search preference to sites that provide secure connection through HTTPS to their website visitors; the statement lead to speculations that Google may add a […]

Things to Consider When Integrating Cloud in an IT Infrastructure

While there are still cloud naysayers among the crowd, there is no denying that cloud technology has matured enough to the point where it’s become foolish for organizations to avoid implementing at least one type of cloud solution for their IT infrastructure. If your organization falls into this category and you don’t want to be […]

What Wireless Hackers Don’t Want You To Know

WiFi made Internet access convenient, but as with any kind of technology, convenience usually has tradeoffs particularly in terms of security. If you think having a secure password and encryption on your wireless access point keeps you safe, then you’d be wrong and thinking the way hackers want you to think so that you can […]

Lessons From the Scariest Security Threats

One of the scariest security threats, particularly for companies who have a lot to lose in terms of finance and data, is what’s called Advanced Persistent Threats or APT. What makes it so much more scary than the average intrusion is that unlike the random hacking attempt, which is usually a hit-and-run because the perpetrators […]

Realistic Web Hosting Expectations

You know the stereotypical portrayal of people having problems with phone networks. Outages are met with irate calls to customer support or even in written form. Consumers have very little patience for outages in these cases, but when it comes to web hosting problems, it would seem that users tend to be a little bit […]

Detecting the Undetectable Through Your Logs

The strange thing about computer security in the corporate world is that many of the victims don’t even know about their own lapses in security, and only become aware after an attack has happened or if it’s noticed by a third party. In some of the worst cases, the lapses are only found years after […]