Search What is Detectify?
×

Web security blog

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

Facebook IT Sec FAQ Two-factor authentication

What is an SQL Injection and how do you fix it?

SQL Injection Vulnerabilities

IT Security FAQ 3: What password-managers are good? Why should you use one?

IT Sec FAQ KeePass Password Managers Password Safe

[Integration] You can now integrate Detectify with Trello

Detectify Integrations Trello Workflow

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?

IT Sec FAQ Plugins WordPress

Inside the head of a white hat hacker

Computer Sweden Ethical Hacking Event Frans Rosen IDG Team White hat

Top 3 takeaways from CIO Trend 2016

CIO Sweden CIO Trends Event Team

Joomla security

CMS Joomla Vulnerabilities

GUIDE: How to get rid of your ‘This site may be hacked’-flag

Google Malware Spam

IT Security FAQ 1: What should you think about when approving an app on Facebook?

Facebook IT Sec FAQ