Cloud spam protection for forums, boards, blogs and sites

No Captcha, no questions, no counting animals, no puzzles, no math. Fight spam!

DDoS on 600 GB/s as the democratization of censorship

Well-known American journalist Brian Krebs for a long time writes on the topics of information security, revealing the identity of dark speculators mainly from Eastern Europe. Over the years, Brian had to over pass through a lot. Evil Ukrainian hacker has gathered on the forums for two bitcoins to buy heroin and send it to

Read more

Vulnerabilities of CCTV systems allow hackers to create massive botnets

According to a statement from US-CERT, in the firmware of digital video products (DVR) AVer Information EH6108H+ found serious vulnerabilities that could allow attackers to easily get to them with remote access and even to form botnets. Vulnerabilities Security researchers have found three critical vulnerabilities. The first (CVE-2016-6535) is the presence of two hidden accounts

Read more

Breeding Business: from ordinary blog to extraordinary magazine

Geek at heart, I always have been coding littles projects on localhost and a few failing websites. I guess I never really took Internet seriously. Then, I realized these jobs I was doing in luxury hospitality were not making me happy. I just loved coming back home and writing, developing and designing. It’s just what

Read more

What is AMP (Accelerated Mobile Pages)? How to setup CleanTalk for AMP

What is AMP? Accelerated Mobile Pages — it’s the tool for static content web-page creation with almost instant load for mobile devices. It consists of three parts: AMP HTML — it’s HTML with limitations for reliable performance and some extensions for building rich content. AMP JS — is library which ensures the fast rendering of

Read more

How to protect a Linux system: 10 tips

At the annual LinuxCon conference in 2015 the Creator of the GNU/Linux core Linus Torvalds has shared his opinion about the safety of the system. He stressed the need to mitigate the effect of the presence of certain bugs by competent protection order in violation of one component to the next layer overlaps the problem

Read more

How to reduce a possibility of brute force attacks on WordPress

Until the moment when CleanTalk launched a security plugin, I didn’t pay much attention to the security of the admin account of WordPress and relied only on the complexity of the password. The most dangerous thing is when the bots use brute-force; pick up the password to the administrator account of the site. This can

Read more

A brief history of passwords from the P to the S: birth, death and the zombie apocalypse

The attack on the World Trade Center towers on 11 September 2001 claimed the lives of 658 employees of the financial company Cantor Fitzgerald. Its Director Howard Lutnick lost that day his brother, faced with an unprecedented problem. And it wasn’t even that the company’s servers, including backup, was also buried under the rubble. Information

Read more

API Method to Getting Country Code by IP Address.

We are pleased to announce the launch of a new API method. Now you can get a country code to identify the country by IP address by one API call. The API method returns a 2 letters country code (US, UK, CN and etc) or full country name (Germany, Canada) for an IP address. Limit

Read more

CleanTalk launches a project to ensure the safety of websites

CleanTalk launches a major project to create a cloud service for the safety of websites. The project will include several functions: protect the site against brute force attacks, vulnerability scanner and virus removal. Each function will have a number of features which help you easily keep the website safe from hackers

Read more

Visualization of attacks, anomalies and security breaches with OpenGraphiti

Those who visit our headquarters in San Jose (Cisco Systems) always amazes large video wall that displays a picture of attacks in real time with the ability to drill after touching certain areas of the screen. However, like any map attacks, and I have collection of already 34, any such visualization is ineffective in rea

Read more