BE MOBILE FRIENDLY!

Most of your customers will be using a mobile these days, if you’re seeing this, you’re on a desktop or a laptop and to help us illustrate our point about focusing on mobile, we’ve shown you our mobile site.

Have you checked yours lately?

Gareth Founder & Director

Learn

Abilash

Public Key, Private Key and the garbage!

Posted in Internet Security, Something Useful by Abilash on February 16, 2016

Cryptography in plain English is all about securing your communication that travels through a network. The two most common and major parts of cryptography are: Encryption & Decryption Keys The main goal of cryptography is to make sure that the decryption ...

read more
Abilash

E-commerce websites and PCI v3.1

Posted in E-Commerce, Internet Security by Abilash on January 29, 2016

The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed ...

read more
Abilash

Important SSL/TLS Certificate Advisory

Posted in E-Commerce, Internet Security, Something Useful by Abilash on December 14, 2015

Please replace all of your SHA-1 SSL/TLS certificates with SHA-256 SSL/TLS certificates as soon as possible. The SHA-256 replacement certificates should be installed on your servers right away. Why do you need to replace their SHA-1 certificates? Some major browsers have already ...

read more
Abilash

3 dangerous ‘–ing’s, you should be aware of

Posted in Internet Security by Abilash on September 18, 2015

Dangerous ‘–ing’s -ing inflects verbs in English grammar but you would never know it could inflect your business too, until you knew about some of these. Here are three ‘–ing’s that are dangerous for your business. Phish-ing Vish-ing Smish-ing What are ...

read more
Abilash

GHOST Vulnerability is in Australia

Posted in Internet Security, Website Hosting by Abilash on February 11, 2015

Which GHOST are we talking about? GHOST is a security vulnerability named after the actual function which was identified as vulnerable in glibc – gethostbyname(). Qualys identified this vulnerability and published their advisory at CEV-2015-0235. The buffer overflow in the ...

read more