Our port Honeypot module is out of Beta

Nikoletta Szabo
We are happy to announce that our developers officially released the port honeypot module. The port honeypot is a perfect way to fight against zero-day attacks and many of our customers are satisfied with it because the module catches and entraps hackers who attempt to break into or scan their servers making them aware of the incoming malicious traffic. The module sets up 100 honeypots chosen randomly from the 1000 most commonly used ports and is able to detect malicious port scanning conducted by hackers.For example, it gets installed on a port where usually there should not be in...
Read more

How Brexit affects the cybersecurity landscape?

Nikoletta Szabo
The British people opened a new phase in the relationship of the UK and the European Union on 2016, 23 June, when they voted to leave the EU. This step not only has impact on the economy or the industry of Britain, but crashes the well-developed cyber security laws, affecting the country’s everyday data and Internet security. Experts revealed how this event will change the cyber security landscape for the inhabitants of the country, as usually upheaval and insecurity creates opportunity for hackers. Apart from the potential for attackers, the Brexit draws another issue with itself, that is the...
Read more

How to build the most secure password of all times?

Nikoletta Szabo
Let’s start this article with a really simple simile, just to be on the safe side and make sure that everyone understands the function of a password. If your account is your home, the password is the key, while the login process is the threshold of your home. So if someone forgets the password, it equals with leaving the keys somewhere and if your account has been hacked, than your home has been sacked.       Two years ago in the USA, as much as 47% of the adult population’s account has been hacked and compromised. This is just one of the hard facts that sho...
Read more

How strong is a „strong” password? 2/2

Ferenc Barta
Part 2   Despite it’s disadvantages, using password-based authentication is still the most common way to identify users on the Internet. The biggest drawback of these methods is that they involve the users. People specify their login credentials whenever they register on a site and people are known to be bad in both specifying and memorizing random strings. I once lost my wallet with my credit card and one of the first questions the administrator in the bank asked me was whether I had my PIN written down on a paper in the wallet. The fact that she asked me about this probably means...
Read more

How strong is a „strong” password? 1/2

Ferenc Barta
The idea   Authentication methods have gone through huge development in the past few years and I believe that the spread of IoT devices will bring further advancement. Currently, however, the most widely used authentication method on the Internet is password-based authentication and we know that this method is far from being ideal – at least in the way many people use it. Let’s imagine a website on which people can create accounts. The web application stores a non-decryptable hash (or more precisely the output of a hash function) of the password given by the user. A hash funct...
Read more

Ad-Blockers from Security Aspect: Curse or Blessing?

Nikoletta Szabo
Have you ever thought about ad-blockers a potential security risk in your everydays? You’d better be banner blind with ad-blockers on or watch out where you click.   Ad-blocker pros   Ad-blocker is an application that is used worldwide to protect your computers from the annoying, flashy and memory-devouring online advertisements. It is an easy-to-use and easy-to-install web browser plug-in which makes the average users’ days more stress-free by diminishing or even eliminating the colourful ads from the webpages. Although, this plug-in unnoticeably triggers positive ca...
Read more

Biggest hacks of 2015

Ferenc Barta
In today’s world more and more features are available online. New solutions become available day by day for making our life easier, simpler, faster. Regarding the last decade we have been able to say goodbye to long hours of administration. The notion of physical distance has changed too as we can speak now with anyone anytime. The main things we gained from the technological boom? Time saved, childhood friends reunited, less trees cut, but have you ever thought of the downsides of global information availability?   Server Security has never been such a hot topic Try to imagi...
Read more

Abdullkarem attack – a hack against sysadmins’ bad practice

George Egri
Mystery is on the horizon, ladies and gentlemen! And we always get excited about unappreciated server attacks. Just like in case of this ‘abdulkarrem’ one. Come, put on the role of Sherlock Holmes with us. Recently, there is a very frequent attack type. More and more sysadmin experience and complain about malicious request like these: GET /wp-includes/css/guide.php?php4&root&upl&wphp4&abdullkarem&GET /wp-includes/css/log.php?php4&root&upl&wphp4&abdullkarem&45GET /wp-admin/includes/iindex.php?php4&root&upl&wphp4&abdullkarem&450799&wp&GET /wp-includes/iindex.php?php4&root&upl&...
Read more

HostingCon Europe 2015 with the BitNinja team

Boglarka Angalet
HostingCon Europe was such a fun event this year and provided a way different experience for us, than being an exhibitor back in San Diego, at the global event. Fizzing atmosphere, great exhibitors, excellent organization and various visitors guaranteed our great time during this couple of days. Some warming up We are so proud to say that we have ninjas from all over the world by now. Building a strong community is essential to make the internet a safer place. As you know, the Netherlands has an exceptional importance in the IT strategy of Europe. In this context, has an important...
Read more

On the spot: HostingCon 2015

Boglarka Angalet
Every year the top elite of web hosting industry come together for 4 days at HostingCon Global. This year San Diego hosted the conference with all its Californian vibes which provided an extraordinary atmosphere for networking, learning and collaboration. Not only the biggest and most influental companies attended as exhibitors this year, but BitNinja was also among the few startups, who debuted at HostingCon for the first time. Funky schedule, gripping performances The four days of the conference was so full of exciting moments, we could barely keep up with the agendas. Trainin...
Read more