The web is growing at a dazzling speed. Thousands of new domains are registered every single day. While some of them turn into investments (considering that the domain name "cars.com" is registered at less than $20 a year like other .com domains and sold for $872 million, domain names are not a bad investment at all), enterprises or new blogs, the rest of them are waiting to be registered by someone. A simple Google search to learn the number of domain extensions in total turned out to be a comprehensive statistical and comparative…
Read MoreNow, there are many smart devices in our homes that do our jobs for us. Most of these devices can connect to the internet. They can both receive information from the environment using sensors (temperature, humidity, motion etc.) and they can be managed remotely with mobile devices. These devices are smarter than we have even seen which are called Internet of Things (IoT). However, there might be some unpleasant aspects of IoT devices. Are you aware of the risks, threats and security issues of IoT devices we use in our homes?
Read MoreThe world is experiencing an unexpected yet enormous crisis. The novel coronavirus (COVID-19) has disrupted the entire world from the service sector to information technologies. This unprecedented event forces every business and every employee to shift their work style. Currently, remote working has become the new normal business. But this work style comes with a price and that is cybersecurity. Cybersecurity gained more importance than ever as COVID-19 continues to spread across the globe. Since employees started to work remotely, companies are trying to adjust their systems to new working conditions. In addition…
Read MoreWhat is Penetration Testing? Pentesting or penetration testing, in simple words is an exercise carried out by a cyber-security expert that involves a series of tests to nail down any potential vulnerabilities within a IT structure. This is a type of on-purpose attack to check the validity of security and to find out about the weak spots (vulnerabilities). A hacker can exploit weaknesses to gain access to that system. Data and reputation loss, information security breaches, violation of confidentiality, disruption of integrity, access outages and many more unwanted events may occur. Penetration testing is a…
Read More