In part 1 of this series, we looked at Installing MySQL Server on Ubuntu 16.04 LTS. In this second part, we will be looking at configuring MySQL securely. Configuration We will start off with the most common settings by opening the default MySQL configuration file using…
Securing MySQL Server on Ubuntu 16.04 LTS – Installing MySQL, Part 1
Databases can be found in everything from desktop applications, web applications, corporate servers to smartphones and other devices. Almost every software program relies on some sort of database to store its data. As applications continue to grow, so is the amount of data that is…
Recent survey shows cost of a breach has climbed to $158 per record
A recently published report titled the ‘2016 Cost of Data Breach Study: Global Analysis’ has suggested that the average cost of a data breach continues to climb, now reaching an average of $4million per breach, or $158 per record from a survey of 383 companies…
In the headlines: TeamViewer hack, LinkedIn hack, TrainLink breach and more
TeamViewer hack – PCs hijacked and bank accounts drained TeamViewer, the remote desktop connection software that allows users to share screens and allow remote access from anywhere in the world recently went offline allegedly due to a DOS-attack. Users however, claim that their computers were…
Value of cyber security market set to soar to $6.7billion
It comes as no surprise that the value of the application security market has risen dramatically in the last few years. Simple deduction tells us bigger cyber-attacks = more money spent on cyber defense. However, the latest claim by market analysts is that by 2021,…
Scanning non-public web applications with Acunetix Online
The Software Development Life Cycle (SDLC) is full of challenges — developers have strict deadlines for creating functional, scalable, maintainable and testable code. What’s more, that code needs to be secure. Acunetix Online among other features, acts as an IP vulnerability scanner and can automatically…
Verizon Data Breach Investigations Report 2016
So, it’s that time of year again. The Verizon Data Breach Investigations Report is out and its time for us to take a good look and analyze their results. The cover, which is dark featuring an illuminati-style symbol and the pull out statistic of ‘89%…
GoDaddy Blind XSS vulnerability – How to detect it and other Out-of-Band Vulnerabilities
Recently, security researcher Matthew Bryant discovered a blind cross-site scripting (BXSS) vulnerability in GoDaddy’s customer support portal —that is the portal accessible only to GoDaddy customer service representatives, not customers. New post: Poisoning the Well – Compromising GoDaddy Customer Support With Blind XSS – https://t.co/uEJWPU8Y4O —…
In the headlines: ImageMagick vulnerability, HIV patient data leak, Brazilian WhatsApp suspension and more
ImageMagick vulnerability being exploited in the wild Following its reveal last week, hackers are leaping on the ImageMagick vulnerability, which could allow an attacker to execute code on servers using the the vulnerable library frequently used to crop or resize images. ImageMagick is a popular…