Magento Security Patch

Magento Security Patch

If you use Magento it’s important you apply a patch (SUPEE-5994) to the software as soon as possible. Get patch …

Read article

Turn ‘404 page not found’ into a positive experience

Turn ‘404 page not found’ into a positive experience

When a visitor clicks on a link that doesn’t work they will often be presented with a dull 404 default …

Read article

Tags:

WordPress SEO by Yoast vulnerability

WordPress SEO by Yoast vulnerability

Action required if you use SEO by Yoast A vulnerability has been identified in the SEO by Yoast WordPress plugin …

Read article

GHOST vulnerability

GHOST vulnerability

A vulnerability has been identified in Linux that allows hackers to gain control of systems without the need for any …

Read article

Tags: ,

Shellshock vulnerability

Shellshock vulnerability

A serious Unix vulnerability has been identified called “Shellshock”. This affects all Linux machines and if exploited hackers could gain …

Read article

Google ranking boost for sites using https

Google ranking boost for sites using https

Google announced earlier this month that a small rankings boost would be added to sites that use an SSL certificate …

Read article

Tags: , ,

Security vulnerability in WordPress and Drupal

Security vulnerability in WordPress and Drupal

Urgent action required for WordPress and Drupal users. An XML weakness has been identified on WordPress and Drupal which allows …

Read article

Keep your website safe with our daily backup service

Keep your website safe with our daily backup service

We are now offering daily automatic website backups for £11.99 per year. The backups are stored stored for 30 days …

Read article

.UK domain names now available

.UK domain names now available

Order your .uk domain name for £8.99 per year We are now offering the shorter UK domain extension for only …

Read article

Tags: , ,

OpenSSL vulnerability

OpenSSL vulnerability

A recent vulnerability has been identified on some versions of OpenSSL which makes it possible for attackers to read keys, …

Read article