4GoodHosting
Live Help
24/7 Support
4GoodHosting Canada 1 866 708 4678
Blog Menu G
Search
Categories
m
m

Category: Security

adobestock 201212297

Just a few weeks back we were sharing with you how WhatsApp was recommending users reinstall their app because of it being hacked. Hopefully those of you that use it have already done so, and if you have then you’re probably good to go with instant messaging for the foreseeable future. It turns out however that the problem of hacks, infection, malware and more is a lot more extensive than just one app and one operating system. A quality Canadian web hosting provider is going to be one that appreciates the full extent of just how much digital connectiveness is important to people, and here at 4GoodHosting we have a front row seat to see the way mobile web browsing has pulled away from desktop in as far as being the means of choice for people. It all points to one well-understood reality; we’re turning to our mobile devices for more and more of everything that we do during the day. A good many of us (myself included) have Android phones, and that’s why recent news from Quick Heal Security Labs is really undeniable when it comes to highlighting the extent of the cyber-attack problem for Android users in nor. And that is that apparently over 3 million malware were detected on Android OS in 2018. Big Number, Big Problem We can paint a picture of the severity of this best by sharing some numbers: 3,059 malware infections per day, working out to 2 every minute across the country for Android devices 1,786 adware infections per day, equally 1 per minute 4,670 PUAs per day, and that’s 3 per minute Yes, there’s an awful lot of smartphones out there, and a good many of them are going to have an Android OS. Those numbers are still fairly staggering though, and it really does put the problem in some perspective. And what’s interesting is that despite the rapid rise in cyberattacks on mobile devices, cyber security experts say device owners aren’t taking this as seriously as they should be. Serious Business Experts state that there will be a significant rise in mobile-focused malware and banking trojans, and another major mobile-based threat...

You may find this interesting too.
adobestock 219422541

No doubt the Internet of Things needs no introduction here given how the latest big wrinkle in the application of World Wide Web-based technology has become so integrally involved in both our private and working lives. As it stands currently, working with IoT applies to some businesses more than others, but it’s fair to say that any of them that put a premium on customer accessibility and control will need to be adhering to IoT realities. Here at 4GoodHosting, we’re a good Canadian web hosting provider like any other in that we prefer to keep our thumbs on the pulse of certain trends in the greater industry more so than others. IoT is definitely one of them, and it continues to be interesting to watch how it reaches further into our digital world every day. Consumers are going to expect more and more ‘smartness’ from their ‘things’ going forward, and businesses of course need to be receptive to that. This makes choosing the right IoT platform a complex endeavor. The landscape can be confusing for IoT hobbyists, experienced developers, and senior executives alike. Today we’ll give you a quick overview of the IoT platform landscape and how you should evaluate IoT platforms based on your needs. Defining an IoT Platform Quite simply, an IoT platform is an integrated service offering what’s needed to bring physical objects online. Supporting millions of simultaneous device connections is the challenge, and your platform needs to allow you to configure your devices for optimized communication between machines. The consensus among developers is that it’s really quite difficult to build a well-functioning IoT product. IoT Platform Types End-to-end IoT Platforms End-to-end IoT platforms provide hardware, software, connectivity, security, and device management tools to handle the massive numbers of concurrent device connections. They also provide all managed integrations needed, which can include OTA firmware updates, device management, cloud connection, cellular modem and more, all of which connect and monitor a fleet of devices online. Connectivity Management Platforms These platforms offer low-power and low-cost connectivity management solutions via Wi-Fi and cellular technologies. Connectivity hardware, cellular networks, and data routing features are all part of connectivity management platforms in...

You may find this interesting too.
adobestock 186885581

WhatsApp is one of the most ubiquitous and popular instant messenger apps these days, and it’s fair to say that there’s likely hundreds of thousands of people who have it installed on their smartphone and make frequent use of it. Well, no one’s about to tell you should stop doing so if you’re one of them, but it turns out that you may want to update it manually now - or perhaps even better delete and re-install it - due to recent developments that have just now gotten out into the media. Part of being a good Canadian web hosting provider is giving clients a heads up on such developments, and that describes 4GoodHosting to a tee if we may say so ourselves. Often times these sorts of things aren’t quite ‘newsworthy’ in that sense, but again considering how common WhatsApp is these days we decided to make it our topic for the week. Right then. So, despite encrypting every conversation and following best security practices, WhatsApp (which is owned by Facebook for those of you who care about those things) it seems has been the victim of a cyber attack. It recently announced that it found a vulnerability that was allowing shady types to infect WhatsApp users with spyware when they made - or even attempted to make - a call using the app. No Answer - No Problem Now most people aren’t ones to take notes of character and number chains, but it would seem this this WhatsApp vulnerability is going by CVE-2019-3568. What makes it especially noteworthy is that it allows attackers to infect the device, and have success doing so even if the user at the other end receiving the call didn’t answer it. The means by which these nefarious individuals did this was by exploiting a buffer overflow weakness in the app, one that enables them to hack into WhatsApp before doing the same on the device running the app. When asked about it, the security team at WhatsApp chose to refer to it as an ‘advanced cyber actor’ - a rare but very dangerous type of cyberattack. It is different from other malware attacks...

You may find this interesting too.
adobestock 99588132
reading time Reading Time: 7 minutes

One of the unfortunate realities for human beings is that as we get older, it’s not as easy for us to perform athletically like we once did. When we’re on the right side of 30 it’s not too challenging to run fast, jump high, and turn on a dime. The 30s are a bit of a transition, and once the 40s arrive it’s pretty clear we’re past our prime. Computers slow down as they age too, but that’s a situation that is remedied a lot more easily. You can take your OS back to it’s virtual 20s quite straightforwardly if you know what to do. That’ll be the topic of discussion here today, and for the world’s most common OS specifically – Windows 10. Here at 4GoodHosting, we’re a good Canadian web hosting provider like any other in that we can relate to how it’s frustrating to have to deal with a device – desktop, tablet, smartphone – that’s more putt-putt than vroom-vroom. What we’ve put together here today is 5 ways to speed up your PC running Windows 10, and they’re all fairly easy to implement. Change your power settings Those of you using Windows 10’s Power saver plan should be aware that you’re actually slowing down your PC. It reduces your PC’s performance in order to save energy (most desktop PCs will usually have a Power saver plan of some sort). Switching your power plan from Power Saver to High Performance or Balanced will provide you with an instant performance boost. Here’s how to do it in Windows 10; Launch Control Panel, then select Hardware and Sound > Power Options You’ll then see two options: Balanced (recommended) and Power Saver. (Certain makes and models will have other plans here as well, including manufacturer-branded ones with some.) Clicking the down arrow will show any additional plans that are options to the High Power setting. To change your power setting, simply choose the one you want, then leave then the Control Panel. High performance will provide the most oomph, but as you’d expect it uses the most power; Balanced finds a nice medium between power use and better performance; Power...

You may find this interesting too.
adobestock 144694506

One thing that certainly hasn’t changed from previous years as we move towards the quarter pole for 2019 is that hackers are keeping IT security teams on their toes as much as ever. That shouldn’t come as much of a surprise given the cat and mouse game that’s been going on in cyberspace between the two sides for a long time now. Cyber threats are as sophisticated as ever now, and for everyday individuals they biggest concern is always that the privacy of sensitive data will be compromised. One of the most common responses to enhanced and more enabled threats is to go with a Virtual Private Network and all the enhanced security features that come with them. Here at 4GoodHosting, we’ve been promoting them for our customers very actively in likely what same way every other Canadian web hosting provider has. There’s merit to the suggestion, as VPN connections protect online privacy by creating a secure tunnel between the client - who is typically uses a personal computing device to connect to the internet - and the Internet. Nowadays, however, VPN networks aren’t as automatic as they were when it comes to trusting in secure connections and understanding that there won’t be data leaks. The good news is that even people with the most average levels of digital understanding can be proactive in protecting their VPN from data leaks. Let’s look at how that’d done here today. Workings of VPN A reliable VPN connection disguises the user’s geographical location by giving it a different IP address. There is also architecture in place to encrypt data transmitted during sessions and provide a form of anonymous browsing. As it is with almost all internet tools, however, VPN connections can also face certain vulnerabilities that weaken their reliability. Data leaks are a concern amongst information security researchers who focus on VPN technology, and it’s these issues that are most commonly front and centre among them: WebRTC Leaks Web Real-Time Communication (WebRTC) is an evolution of the VOIP (Voice over Internet Protocol) for online communications. VoIP is the technology behind popular mobile apps such as Skype and WhatsAppp, and it’s been the leading...

You may find this interesting too.
adobestock 204778856

We don’t know about you, but for those of us here it doesn’t seem like it was that long ago that 3G Internet speeds were being revelled in as the latest and greatest. Things obviously change fast, as 3G has been in the rear view mirror for a long time now, and the reality is that the newest latest and greatest – 4G – is about to join it there. Here at 4GoodHosting, the fact we’re a leading Canadian web host makes us as keen to learn more about what the new 5G networks have in store for us as anyone else who’s in the digital space day in and out. It appears that we’re in for quite a treat, although there are some who suggest tempering expectations. That’s to be expected anytime wholesale changes to infrastructure key to big-picture operations are forthcoming. Nonetheless, we’re supposed to be immersed in the 5G world before the end of next year. Mobile 5G is expected to start making appearances in cities around North America this year, with much more extensive rollouts expected in 2020 so a discussion of what we can all expect from 5G is definitely in order. Let’s do it. What is 5G, and How’s It Going to Work? To cut right to it, 5G is the next generation of mobile broadband that will augment 4G LTE connections for now before eventually replacing them. 5G is promising to deliver exponentially faster download and upload speeds along with drastically reduced latency - the time it takes devices to communicate with each other across wireless networks. Right, that alone is worthy of some serious fanfare, but fortunately there’s even more to this. But before getting into additional benefits expected to be seen with 5G networks, let’s have a look at what makes them different from 4G ones and how exactly these new super networks are predicted to function. Spectrum-Specific Band Function It’s important to start with an understanding of the fact that unlike LTE, 5G is going to operate on three different spectrum brands. The lowest one will be the sub-1GHz spectrum bands like GSMA / ITU. They are what’s known as...

You may find this interesting too.
adobestock 191230366

Most people aren’t any more familiar with Wi-Fi beyond understanding that it means a wireless internet connection. Those same people won’t be aware that in the last near decade the digital world has moved from Wi-Fi 4 to to Wi-Fi 5, and now Wi-Fi 5 is set to be replaced by Wi-Fi 6. What’s to be made of all of this for the average person who only knows that the wi-fi networks in their home and office are essential parts of their connected day-to-day, and that the wi-fi in Starbucks is pretty darn convenient as well. The numeric chain that identifies a Wi-Fi standard is something they may well recognize though. 802.11 is the standard, but the Wi-Fi 4 you had from 2009 to 2014 is different from the same 802.11 standard you’ve had with Wi-Fi 5 since then till now. What’s to come later this year with Wi-Fi 6 will be a different 802.11. Right, we get you - what’s the difference exactly. Here at 4GoodHosting, we’re like any quality Canadian web hosting provider in that the nature of our work and interests makes it so that we pick up on these things, if for no other reason than we’re exposed to and working with them on a regular basis. Much of the time these little particulars related to computing, web hosting, and digital connectivity aren’t worth discussing in great detail. However, because Wi-Fi is such an essential and much-appreciated resource for all of us we thought we’d look at the ‘new’ Wi-Fi set to arrive later this year here today. Wi-Fi 6: Problem Solver When we look at ‘802.11ac’, the average person won’t get the significance of that. The fact is, however, they should and what Wi-Fi 6 is being designed to be is a solution to that problem. What we’re going to see is the beginning of generational Wi-Fi labels. Let’s make you aware that there is a collective body known as the Wi-Fi Alliance. They are in charge of deciding, developing, and designating Wi-Fi standards. We are all aware of how devices are becoming more complex and internet connections evolve, and when they do the process...

You may find this interesting too.
adobestock 117202557

It’s likely that a good many of you are among the thousands upon thousands of people who have an Ad Blocker installed for your web browsers of choice. Some people do use them simply to avoid the nuisance of having to watch ad after ad, and it’s people like these that have necessitated some sites to insist that you ‘whitelist’ them in order to proceed into the website they want to visit. That’s perfectly understandable, as those paying advertisers are the way the website generates income for the individual or business. For others, however, we spend a great deal of our working day researching and referencing online, and having to watch ads before getting to the content we need in order to do our work. For us, an ad blocker is much more of a tool of necessity rather than convenience. Still, we get caught up in more than a few sites that will insist on being whitelisted too. For me, my ad blocker is a godsend and I don’t whitelist any website or disable my ad blocker for any of them. Here at 4GoodHosting, part of what makes us a good Canadian web hosting provider is having built up an insight into what really matters to our customers. The bulk of them are people who use the Information Superhighway as a production resource rather than web ‘surfers’ for whom it’s more of an entertainment one. That’s why today’s news is some that’s sure to be very relevant for most of our customers. Weakened WebRequest APIs Some of you may not know how your ad blocker works, and that’s perfectly normal. As long as it does its job, you don’t really need to know. Chromium is Google’s newest all-powerful web browser, and just like Chrome did you can expect it to soon become nearly ubiquitous as most people’s web browser of-choice. However, Chromium developers in the last few weeks have shared that among the updates they are planning to do in Manifest V3 is one that will restrict the blocking version of the webRequest API. The alternative they’re introducing is called declrativeNetRequest API. After becoming aware of it, many ad...

You may find this interesting too.
adobestock 115681593

No one will need to be convinced of the fact there’s a massive number of shady websites out there designed to ensnare you for any number of no-good purposes. Usually you’re rerouted to them when you take a seemingly harmless action and then often you’re unable to back <- yourself out of the site once you’ve unwilling landed on it. Nobody wants to be on these spammy or malicious pages and you’re stressing out every second longer that you’re there. The well being of web surfers who also happen to be customers or friends here at 4GoodHosting is important to us, and being proactive in sharing all our wisdom about anything and everything related to the web is a part of what makes one of the best Canadian web hosting providers. It’s that aim that has us sharing this news with you here today - that Google understands the unpleasantness that comes with this being locked into a website and has plans to make it remediable pretty quick here. The first time something like this occurs you’ll almost certainly be clicking on the back button repeatedly before realizing it’s got no function. Eventually you’ll come to realize that you’ve got no other recourse than to close the browser, and most often times you’ll quit Chrome altogether ASAP and then launch it again for fear of inheriting a virus or something of the sort from the nefarious site. How History Manipulation Works, and what Google is Doing About It You’ll be pleased to hear the Chrome browser will soon be armed with specific protection measures to prevent this happening. The way the ‘back’ button is broken here is something called ‘history manipulation’ by the Chrome team. What it involves is that the malicious site stacks dummy pages onto your browsing history, and these work to fast-forward you back to the unintended destination page you were trying to get away from. Fortunately, Chrome developers aren’t letting this slide. There are upcoming changes to Chromium’s code which will facilitate the detection of these dummy history entries and then flag sites that use them. The aim is to allow Chrome to ignore the entirety...

You may find this interesting too.
adobestock 173503359
reading time Reading Time: 8 minutes

A discussion of cybersecurity isn’t exactly a popular topic of conversation for most people, but those same people would likely gush at length if asked about how fond of public wi-fi connections they are! That’s a reflection of our modern world it would seem; we’re all about digital connectivity, but the potential for that connectivity to go sour on us is less of a focus of our attention. That is until it actually does go sour on you, of course, at which point you’ll be wondering why more couldn’t have been done to keep your personal information secure. Here at 4GoodHosting, cybersecurity is a big priority for us the same way it should be for any of the best Canadian web hosting providers. We wouldn’t have it any other way, and we do work to keep abreast of all the developments in the world of cybersecurity, and in particular these days as it pertains to cloud computing. We recently read a very interesting article about how our preferences for the ways we (meaning the collective whole of society) use public wi-fi can highlight some of the natures and needs related to web security, and we thought it would be helpful to share it and expand on it for you with our blog this week. Public Wi-Fi and Its Perils Free, public Wi-Fi is a real blessing for us when mobile data is unavailable, or scarce as if often the case! Few people really know how to articulate exactly what the risks of using public wi-fi are and how we can protect ourselves. Let’s start with this; when you join a public hotspot without protection and begin to access the internet, the packets of data moving from your device to the router are public and thus open to interception by anyone. Yes, SSL/TLS technology exists but all that’s required for cybercriminal to snoop on your connection is some relatively simple Linux software that he or she can find online without much fuss. Let’s take a look at some of the attacks that you may be subjected to due to using a public wi-fi network on your mobile device: Data monitoring W-fi...

You may find this interesting too.
On This Page G
Explore 4GOODHOSTING
Copyright © 2026 4GoodHosting. All Rights Reserved.
+1 866 708 4678