So far if you wanted to protect the privacy of people that visit your website, the only possibility you had was to purchase a Transport Layer Security (TLS) certificate. Let’s Encrypt offers free certificates for securing the connection to websites using TLS, which causes the green lock icon to appear in the URL bar. In a previous blog post we were very enthusiastic about Let’s Encrypt. We promised to implement it into our Service Centre — Cosmos, as soon… Read more
At Greenhost we constantly strive to increase the security of your websites. On the 30th of June 2016 we succeeded in securing all .nl domains that are registered at Greenhost with DNSSEC. During the rest of this summer we will roll out DNSSEC for domains registered through us on other Top Level Domains supporting DNSSEC (TLDs, for example .com, .net and .org).
Ransomware is a type of malware that restricts access to the infected computer system in some way, and demands that the user pays a ransom to the malware operators to remove the restriction. Windows-based computers have always been the main target, but two weeks ago also a case of ransomware for OS X surfaced. The new OS X ransomware ‘Keranger’ infected the Transmission bittorrent client installer, which has put many OS X users at risk. Last week big-name sites were… Read more
In this blog post an update on the things we’ve been working on the last few months; 2-factor authentication Service Center, HAProxy plugin for Let’s Encrypt’, Internet Thesis Price, Internet Freedom Festival and the Rapid Response Service.
Winter news: Important Joomla! security updates, migrations completed, DDoS and DoS attacks, Let’s Encrypt and the Free Expression Film night17 December 2015 -
In this blog post an update on the things we’ve been working on the last few months; Migrations to Ceph platform completed, important security updates Joomla!, DDoS attacks and the impact on our platform, the Free Expression Film night and the public beta release of Let’s Encrypt. Happy holidays! Important Joomla! security updates An important and general rule is: always keep your software up to date! More and more vulnerabilities are found every day and the consequences can be… Read more
“Client info of T-mobile customers on the streets”, “Ashley Madison leaks personal details of 37m users”, “health care high on the list of leaking data.” When data leaks reach the news it is mostly about incidents of bigger institutions or companies leaking clients. But those are not the only data leaks that need attention. The biggest data leakers are we, ourselves. When we are using the internet in a ‘normal’ way we are constantly giving away bits of data with… Read more