Security and protection in Internet

Username and Password Phishing

Have you recently received an email from а bank requiring immediate update of your contact data, otherwise your bank account will be suspended? Phishing emails concern not only banks and credit institutions, but also different types of business companies.

Use an Encrypted Connection

Here comes the sixth post from our security sequence. Yesterday we told you more about the importance of having a reliable hosting partner for securing your web presence. Today we will focus on connections.

Security Week in Our SuperBlog

At the time of the year when everyone is having their summer holidays we decided to prepare something useful and intriguing to read for the upcoming week. We all keep promising ourselves that “next week” we will start working on a new project, we will start working out and having a healthier lifestyle. However, SuperHosting guarantees you that every day from the “next week” we are going to share with you seven steps to have a secure and reliable website for you and all of your visitors. You might not be sure how long this time summer will last, but one is for sure - the security week in our SuperBlog starts very soon...

SuperHosting.BG protects your personal data in full compliance with the GDPR

GDPR, the new data protection regulation, has been one of the hottest business topics in recent months. The regulation will come into force on 25 May 2018. Our company would like to point out the following: The security and protection of all customer data, not just personal data, has always been a top priority for us. In this article we will explain what steps we have taken to meet the GDPR requirements.

Widespread CPU Security Flaw Just Announced and the Measures We Took

An alert for massive security flaws in Intel, AMD and ARM processors that have been manufactured during the last 10 years was disclosed on January 3, 2018. This lead to describing two critical vulnerabilities - Spectre and Meltdown. In short: these vulnerabilities disclose the OS core's RAM and other processes to malicious programs that can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. All modern computers, servers, smartphones and tablets are affected.