Following a massive cyberattack targeting Ireland’s health service IT infrastructure across the country nearly two weeks ago, many hospitals are still without computer services. Believed to have been launched by a cybercriminal group known as Wizard Spider, a ransomware tool called Conti was used to attack the Health Service Executive (HSE). It’s the worst cybercrime attack on an Irish state agency to date.Read more
On May 7th, Colonial Pipeline, a major US fuel pipeline serving the country’s east coast, was the target of a cyber-attack by a hacker group known as DarkSide. The consequential closure of the pipeline caused fuel shortages and panic buying among those living in the affected states.
To the less tech-savvy among us, serverless computing probably isn’t exactly what it sounds like. So then, what is it, exactly? Well, it’s a type of cloud computing where cloud providers manage the execution of code for software developers, a marked change from how applications were once traditionally built and deployed.
Have a website? Want it to get found in search engines? If the answer to these questions is “Yes”, then it’s likely you’ve given search engine optimization (SEO) a go at some point, or at least more than a passing thought. While the impulse when getting started with SEO is often diving headfirst into keyword research and link building, there are some lesser talked about aspects of SEO that are just as important. Namely, two crucial files you should have on your site: robots.txt and sitemap.xml.
All Internet users have likely heard the term “IP address” mentioned on their web surfing travels, but do you know what they are and how they work? In this article, we’ll be looking at these mysterious sets of numbers digital devices need to connect to the Internet, and why they are integral to how the Internet functions.
Anyone with a computer or digital device has probably heard the term firewall before, even if they don’t quite understand what it is or what they do. It’s sort of a pity because firewalls play a massive role in cybersecurity across myriad types of devices and networks. Behind every secure website, network, or device is an excellent firewall. They should be celebrated more!
As you may have noticed, cryptography is our bread and butter here on SSLs.com, given that it’s the underlying technology of SSL certificates. That’s why it’s fascinating to see how cryptography can be utilized in different contexts, one of the most exciting being blockchain.