SiteLock_Infographic_MainPhoto

See How Fast SiteLock Mitigates Cyber Threats [Infographic]

Did you know that SiteLock scans more web pages in a day than McDonald’s sells hamburgers? How about that we analyze more source code files per day than Dominos sells pizzas in a year? We’ve put together this infographic to give you an idea of how quickly we work to mitigate cyber threats.

SiteLock Infographic

 

Malware Removal

How to Look for Malware in your Website Files

It can come as quite a surprise when a site owner is notified that their site has been compromised with malware. After the shock wears off, and the immediate impact understood, it’s important to take stock of what has actually happened behind the scenes and then clean it up. The best advice anyone can give you is to make frequent, downloaded backups of your site in the event something happens to the live version so that the clean backup can replace the live, hacked version.

But what if there is no clean, viable backup available? In a world where websites have hundreds, if not thousands of files, how can any one person go about cleaning out an infection in just a small number of those files? In this two part series, we’ll talk about how to look for malware in both files and databases and give a couple examples of what to be on the lookout for.

Read More

SiteLock Website Security

Are you Batting a Thousand when it comes to Website Security?

Cybercriminals are unpredictable. They’ll surprise you by sneaking into your website, executing attacks and harming your data and business. You can think of it like a baseball game, in which the hacker is trying to make it to the next base without getting called out. Secure all your bases by learning a little about how hackers attack your website.

Read More

4th of July Banner

Celebrating our Freedom to a Safe and Accessible Internet

We celebrate Independence Day to honor the adoption of the Declaration of Independence on July 4, 1776. As Americans, we have the right to freedom of religion, speech, press, and the Internet.

Read More

Cost of Data Breach Infographic

Calculating the Cost of a Data Breach [Infographic]

The cost of a data breach is rising globally. Learn how different countries and industries are impacted when they’re hit with one.

Read More

social network data breach

Cybercriminals are Oversharing with Social Media Data Breaches

It’s been a busy time for data breaches in the social media world with Myspace, LinkedIn and Twitter all experiencing them. In each of these cases, the cybercriminals behind the breaches were after usernames and passwords. The most commonly used passwords today are, “password” and “123456,” and it only takes a hacker .29 milliseconds to crack them.

Read More

This Week in Exploits: A Quick Look at Turkish Escort Spam

This Week in Exploits-SiteLock

This week we’ll take a look at an interesting SEO spam campaign that recently came across the SiteLock research desk. Turkish escorts are apparently big business and we had the opportunity to dig a bit into the makings of a malicious Turkish escort spam campaign.

Read More

Website_attack_examples

Why Would Someone Want to Hack my Website?

It is hard to keep track of all the websites that are compromised on a daily basis. Cybercriminals are constantly crawling the web for targets, and they’ll often go after websites you might not expect, such as a vegan cooking blog. So what does a hacker look for in a website? And why would they be tempted to attack your site? Here are some examples so you have an accurate picture of common website attacks.

Read More

Malware_infographic

Exploring the Different Types of Malware [Infographic]

Malware, short for malicious software, is typically installed on a website by cybercriminals. Malware is a broad term that refers to a variety of malicious programs. It can spread viruses, steal personal or financial data and even hijack computers.

Read More

SiteLock Named To The 2016 Online Trust Alliance Honor Roll

June 14, 2016

Scottsdale, ArizonaSiteLock, the global leader in website security solutions, today announced that it has been named to the 2016 Online Trust Alliance’s (OTA) Honor Roll listing, marking the fourth consecutive year the company has earned this distinction for its excellent leadership and a commitment to data protection, privacy and security.

Read More

Page 1 of 28

Powered by WordPress & Theme by Anders Norén