All posts by Charlie

IT Security FAQ 6: What CMS is the most vulnerable?

A CMS is a Content Management System used to create, manage and organize content on a web sites or web services. One of the most common ones is WordPress. Different CMS have different levels of vulnerability. Comment from our expert:”It’s...

/ April 12, 2016

Convince Your Client To Use Detectify

Want to offer your clients security and help them make their services safer with Detectify? That’s fantastic! Security is becoming increasingly important for businesses and adding Detectify to your offering can give you a competitive edge while delivering continuous security monitoring. Most companies...

/ April 11, 2016

OWASP TOP 10: Injection

Update: Based on the OWASP Top 10 2021 proposed, injection now welcomes Cross-site Scripting (XSS) into the group. It’s no longer top of the OWASP list (at #3), however still very prevalent with 274k occurrences in the data analysis. Injection,...

/ April 6, 2016

WordPress Security

WordPress is amazing, we can’t argue with that. It’s efficient, powerful, and functional. However, given that it is the most popular Content Management System (CMS) in use, it is also the most vulnerable CMS platform out there. To learn more...

/ March 31, 2016

How to Improve Your WordPress Security: Plugins and Themes

A clean WordPress installation is not much fun, but plugins and themes can have security issues that should not be ignored. In this blog post, we explain what is good to take into consideration when installing a plugin or theme,...

/ March 30, 2016
IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

Comparing White Hat to Black Hat hacking is kind of like comparing the good guys to the bad guys. White Hat hackers look for vulnerabilities and report them, whereas Black Hat hackers have a more mischievous agenda. They are the...

/ March 17, 2016
How To Improve Your WordPress Security

How To Improve Your WordPress Security

WordPress is a great Content Management System, it’s easy to use, maintain and there is an ocean of plugins and themes from developers worldwide. What started out as a very simple blogging platform is now much more. In the early...

/ March 15, 2016
IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

Activating 2-step verification or Two-factor authentication on a service means that you have to identify yourself twice in order to access your account – often both with a password and by receiving a code to your phone by text message...

/ March 9, 2016
What is an SQL Injection and how do you fix it?

What is an SQL Injection and how do you fix it?

SQL injection flaws are very critical. A remote attacker will gain access to the underlying database. In the worst case scenario it allows the attacker to read, write and delete content in the database. Risk of SQL Injection The attacker...

/ March 8, 2016
IT Security FAQ 3: What password-managers are good? Why should you use one?

IT Security FAQ 3: What password-managers are good? Why should you use one?

People tend to use the same password on many sites because it’s hard to remember multiple passwords in your head for every service you are using online. The problem is, that if someone hacks one of the services you are...

/ March 2, 2016
[Integration] You can now integrate Detectify with Trello

[Integration] You can now integrate Detectify with Trello

For all our Kanban enthusiasts, we are here with a new integration to Trello! We now push our reports to your favourite security to-do list. Let’s take a look at what your reports will look like in Trello: To learn how...

/ February 26, 2016
IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?

To add different functions to the popular CMS WordPress – like social media icons or contact forms – it’s usual for people to install and activate different plugins. However, it is important to keep in mind that most security breaches...

/ February 25, 2016