<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: manindar mohan</title>
    <description>The latest articles on DEV Community by manindar mohan (@manindar_m).</description>
    <link>https://dev.to/manindar_m</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F397244%2F9bcb149c-5aaf-40f0-bed4-95e0e92c7bb7.jpeg</url>
      <title>DEV Community: manindar mohan</title>
      <link>https://dev.to/manindar_m</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/manindar_m"/>
    <language>en</language>
    <item>
      <title>Nginx Server Security: Nginx Hardening</title>
      <dc:creator>manindar mohan</dc:creator>
      <pubDate>Tue, 17 Nov 2020 08:58:06 +0000</pubDate>
      <link>https://dev.to/manindar_m/nginx-server-security-nginx-hardening-5cbo</link>
      <guid>https://dev.to/manindar_m/nginx-server-security-nginx-hardening-5cbo</guid>
      <description>&lt;p&gt;Nginx is a lightweight, open-source, robust, high-performance HTTP server and a reverse proxy. It’s the most popular web server, beating Apache and IIS.&lt;/p&gt;

&lt;p&gt;While the default configurations are favored by most people, they are not secure enough, and extra tweaks are needed to reinforce the web server.&lt;/p&gt;

&lt;p&gt;Here, we will look into some actions you can take to strengthen and improve Nginx server security.&lt;/p&gt;

&lt;h3&gt;
  
  
  Disable Any Unwanted Modules
&lt;/h3&gt;

&lt;p&gt;It is advised to disable any modules that are not used as this will decrease the risk of potential attacks by limiting operations.&lt;/p&gt;

&lt;h3&gt;
  
  
  Implement SSL Certificate
&lt;/h3&gt;

&lt;p&gt;The SSL certificate is a digital certificate powered by cryptography that encrypts data traffic between your web server and the web browser. SSL certificate also forces your website to use the secure HTTPS protocol over HTTP, which transmits traffic in plain text.&lt;/p&gt;

&lt;h3&gt;
  
  
  Exclude Server Headers
&lt;/h3&gt;

&lt;p&gt;Server Headers disclose the Nginx version and it helps the attacker to plan further.&lt;/p&gt;

&lt;h3&gt;
  
  
  Resource Control
&lt;/h3&gt;

&lt;p&gt;To counter potential DoS attacks on Nginx it’s possible to set buffer size restrictions for all the clients.&lt;/p&gt;

&lt;p&gt;Leaving the server in default configuration is not a secure practice to follow and what we neglect as a low risk might become a possible threat in the future.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A more detailed version with implementation is published at : &lt;a href="https://beaglesecurity.com/blog/article/nginx-server-security.html"&gt;https://beaglesecurity.com/blog/article/nginx-server-security.html&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>devops</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>WordPress Security: Vulnerabilities And How To Improve Security</title>
      <dc:creator>manindar mohan</dc:creator>
      <pubDate>Wed, 22 Jul 2020 13:33:03 +0000</pubDate>
      <link>https://dev.to/manindar_m/wordpress-security-vulnerabilities-and-how-to-improve-security-2n9j</link>
      <guid>https://dev.to/manindar_m/wordpress-security-vulnerabilities-and-how-to-improve-security-2n9j</guid>
      <description>&lt;p&gt;All websites are not created equally. Any website can experience technical issues but with a WordPress website, you’re also leaving yourself exposed due to its vulnerable nature.&lt;/p&gt;

&lt;p&gt;WordPress runs on open source code and has a team of dedicated engineers to identify and fix security issues that occur in the core source code. As soon as a security vulnerability is disclosed, a security patch is immediately pushed.&lt;/p&gt;

&lt;p&gt;That’s why managing WordPress and keeping it updated to the latest version is incredibly essential to the overall security of your website.&lt;/p&gt;

&lt;h2&gt;
  
  
  WordPress Security Vulnerabilities
&lt;/h2&gt;

&lt;p&gt;If you maintain a WordPress-powered website or do consider using WordPress as your CMS, you should be concerned about the possible WordPress security issues. Here, I’ll outline several common WordPress security vulnerabilities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Unauthorized Logins&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cross-Site Scripting&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;SQL Injections&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File Inclusion Exploits&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Denial-of-Service Attacks&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What Makes A WordPress Website Vulnerable
&lt;/h2&gt;

&lt;p&gt;Some of the main reasons that make a WordPress website vulnerable include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Weak passwords&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Not frequently updating plugins and themes&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Using plugins and themes from untrustworthy sources&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Using poor-quality or shared hosting&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How To Improve WordPress Website Security
&lt;/h2&gt;

&lt;p&gt;You can keep your WordPress website secure and prevent data breach or loss by following certain security best practices. They are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Having a strong password policy so that users need to provide longer and more secure passwords&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enabling two-factor authentication&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Frequently updating WordPress core, themes and plugins&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Implementing proper permissions for web server’s directory&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Scheduling vulnerability and malware scans on a regular basis&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Keeping a reliable and effective backup plan&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Activating brute force protection&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;A more detailed blog is published at :&lt;/em&gt; &lt;em&gt;&lt;a href="https://beaglesecurity.com/blog/article/wordpress-security.html"&gt;https://beaglesecurity.com/blog/article/wordpress-security.html&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>wordpress</category>
      <category>testing</category>
    </item>
    <item>
      <title>Hardening Server Security By Implementing Security Headers</title>
      <dc:creator>manindar mohan</dc:creator>
      <pubDate>Mon, 29 Jun 2020 15:17:10 +0000</pubDate>
      <link>https://dev.to/manindar_m/hardening-server-security-by-implementing-security-headers-2hp4</link>
      <guid>https://dev.to/manindar_m/hardening-server-security-by-implementing-security-headers-2hp4</guid>
      <description>&lt;p&gt;Most of the security vulnerabilities can be corrected by implementing specific headers in the server response header. HTTP security headers present yet another tier of security by helping to mitigate intrusions and security vulnerabilities.&lt;br&gt;
We will examine some of them to help you better know their purpose and how to implement them.&lt;/p&gt;

&lt;h2&gt;
  
  
  What are HTTP security headers?
&lt;/h2&gt;

&lt;p&gt;Whenever a browser requests a page from any web server, the server responds with the content along with HTTP response headers. These HTTP security headers tell the browser how to behave while handling the website content.&lt;/p&gt;

&lt;h3&gt;
  
  
  Content Security Policy
&lt;/h3&gt;

&lt;p&gt;The Content Security Policy header implements an additional layer of security. This policy helps prevent attacks such as Cross-Site Scripting (XSS) and other code injection attacks by limiting content sources that are approved and thus permitting the browser to load them.&lt;/p&gt;

&lt;h3&gt;
  
  
  X-Frame-Options
&lt;/h3&gt;

&lt;p&gt;The X-Frame-Options HTTP response header is used to indicate if a browser is permitted to execute a page in a “frame”, “iframe” or “object” HTML tag. Sites and applications can use this to dodge clickjacking attacks, by ensuring their content cannot be embedded into other sites.&lt;/p&gt;

&lt;h3&gt;
  
  
  X-XSS-Protection
&lt;/h3&gt;

&lt;p&gt;X-XSS-Protection header is intended to protect against Cross-Site Scripting attacks.&lt;/p&gt;

&lt;h3&gt;
  
  
  X-Content-Type-Options
&lt;/h3&gt;

&lt;p&gt;The X-Content-Type-Options header is used to indicate that the MIME types recorded in the Content-Type headers should not be changed. This protects you from MIME type sniffing.&lt;/p&gt;

&lt;h3&gt;
  
  
  HTTP Strict Transport Security
&lt;/h3&gt;

&lt;p&gt;A Strict Transport Security header (HSTS) enables the application to inform browsers that it should be only accessed using HTTPS instead of HTTP.&lt;br&gt;
If the website or application allows connection through HTTP before redirecting to HTTPS, visitors can communicate with the non-encrypted version of the site before the redirect which creates an opportunity for man-in-the-middle attacks.&lt;br&gt;
Upon the first interaction with a website, the browser won’t be aware of an HSTS Policy for the host, therefore the initial communication is taking place over HTTP.&lt;br&gt;
To resolve this problem, browsers contain a preloaded list of sites that are configured for strict transport security. HSTS is generally set to a “max-age” value that is high enough to keep the website cached in the HSTS account for the entire duration that is specified.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A more detailed version with implementation on different servers with graphical representation is published at :&lt;/em&gt; &lt;em&gt;&lt;a href="https://beaglesecurity.com/blog/blogs/2020/06/27/Hardening-server-security-by-implementing-security-headers.html"&gt;https://beaglesecurity.com/blog/blogs/2020/06/27/Hardening-server-security-by-implementing-security-headers.html&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>devops</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Cyber Security Threats And Best Practices For Remote Workers</title>
      <dc:creator>manindar mohan</dc:creator>
      <pubDate>Tue, 02 Jun 2020 13:38:53 +0000</pubDate>
      <link>https://dev.to/manindar_m/cyber-security-threats-and-best-practices-for-remote-workers-2ih7</link>
      <guid>https://dev.to/manindar_m/cyber-security-threats-and-best-practices-for-remote-workers-2ih7</guid>
      <description>&lt;p&gt;As we are going through unusual and challenging times, our daily habit has been affected in all sorts of ways. For those who are working from home, this is indeed a very difficult time. We are more open to cyber attacks due to the little to no cyber security we have in place while working from home.&lt;/p&gt;

&lt;p&gt;Hackers are desperately trying to exploit the opportunity and up to some extent, it’s working. It’s mainly because many organizations and business tasks have gone from an internal network to the open internet without much preparation. This has exposed them to more potential threats.&lt;/p&gt;

&lt;p&gt;Some of the common attacks are listed below.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Email-Phishing&lt;/li&gt;
&lt;li&gt;SMS-Phishing&lt;/li&gt;
&lt;li&gt;Mobile Malware&lt;/li&gt;
&lt;li&gt;Malicious Software&lt;/li&gt;
&lt;li&gt;Ransomware Attacks&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cyber Security Best Practices For Remote Workers
&lt;/h3&gt;

&lt;p&gt;In this rising time of cyber attacks, taking preventive action against these interventions is a necessity.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use antivirus and antispyware software on every computer used in your business and make sure they are frequently updated.&lt;/li&gt;
&lt;li&gt;Limit physical access to your computers and network components.&lt;/li&gt;
&lt;li&gt;Regularly change passwords and ensure that they’re not easy to predict&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;more detailed version published at &lt;a href="https://beaglesecurity.com/blog/blogs/2020/04/13/Cyber-Security-Threats-and-Best-Practices-for-Remote-Workers.html"&gt;https://beaglesecurity.com/blog/blogs/2020/04/13/Cyber-Security-Threats-and-Best-Practices-for-Remote-Workers.html&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>productivity</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
