Learn it fast with expert-taught software and skills training at lynda.com. Start your free trial

By Morten Rand-Hendriksen | Monday, April 27, 2015

Zero Day and Other Threats: Is WordPress Safe?

Is WordPress safe? Find out

WordPress users may have felt a cold chill run down their spines this morning as they read the title of Forbes Magazine’s post “WordPress Under Attack As Double Zero-Day Trouble Lands”—or any of the numerous other articles covering the latest WordPress vulnerability to be uncovered.

Over the past two months, there’s been talk of several WordPress security issues, and WordPress users around the world are asking the obvious question: Is WordPress safe?

The simple answer is that WordPress is safe—relatively speaking. But that’s not to say these latest issues are not worrysome.

To understand why WordPress is safe in spite of these latest exploits, and why WordPress exploits are becoming such a hot topic in the media, we have to look at both the safety—and the vulnerability—in numbers, and the security that results from keeping your code open source.

By Scott Simpson | Thursday, September 25, 2014

Protect Your System from the Shellshock Bash Exploit


On Wednesday, the world learned about a bug in the popular Unix, Linux, and Mac OS X command line interpreter Bash.

Discovered by engineers at Red Hat, this bug is known as Shellshock, and allows an attacker to run commands in the Bash shell. Since the bug was announced, Bash has been updated for the major platforms it affects—so it’s pretty easy to update and protect systems.

But there’s a problem: Bash is so widespread, and installed on so many devices—such as cable modems, routers, and other devices with embedded Linux operating systems—that it will be difficult, if not impossible, to fully patch everything that’s affected. (Windows users are generally unaffected by Shellshock, unless they’ve specifically installed Bash along with Cygwin, Git Bash, or other third-party packages.)

And that’s what makes it so important to update and protect what you’re able to fix.

By Jess Stratton | Wednesday, May 14, 2014

4 Tips for Teaching Your Kids Browser Safety

Teaching your children online safety

If you have kids, then your computer, phone, or tablet may be chock full of protective measures, as it should be. You’ve also most likely talked to your children about browser safety– where they are allowed to go online, what they are allowed to post, and whom they should tell if they come across something inappropriate.

However, it’s not uncommon for a child to go to a friend’s house or a public kiosk computer that lacks those protective measures you’ve put in place at home.

Here are four browser safety tips to help your kids navigate some hazards of the Internet—and suggestions for turning those tips into teachable moments.

By Willem Knibbe | Tuesday, April 15, 2014

Protect Yourself from the Heartbleed Vulnerability

Heartbleed - what you need to know

Learn how to protect yourself and your sites from the Heartbleed vulnerability, the security flaw that can put sensitive user data at risk and affects hundreds of thousands of websites. Today lynda.com released Protecting Yourself from the Heartbleed Bug, a short course that explains what Heartbleed is and how to protect yourself from it, and offers resources for tracking the developing situation. Heartbleed Tactics for Small IT shops also released today; it provides tactics and information to help those who administer a small web server diagnose their vulnerability and fix issues.

By Jess Stratton | Monday, March 24, 2014

Troubleshooting Wi-Fi security: Monday Productivity Pointers

Troubleshooting wi-fi security

Before we get started, I’m happy to announce this week marks our 52nd week of Monday Productivity Pointers–one whole year of productivity with lynda.com! Thanks to each and every one of you for sending in your requests and your recommendations.

By Jess Stratton | Monday, February 10, 2014

Secure yourself when using cloud apps: Monday Productivity Pointers

Enabling 2-step authentication to Google web apps

Explore Monday Productivity Pointers at lynda.com.

Here on Monday Productivity Pointers, I love to talk about cloud apps. I love using apps that you can access from anywhere—your computer, laptop, phone, or tablet. This week, we’ll discuss an important topic around cloud apps: how to secure yourself when using them. In my first video, I’ll show you how to enable two-step authentication, a more secure way of logging in, also referred to as “two-factor authentication.”

More and more cloud apps are offering two-step authentication. When you enable it, step one is to log in to the app with your user name and password as usual. You’ll then receive a text message on your phone from the cloud app itself, containing a second password. Step two is to go back into the app and enter that second password for access.

By Jess Stratton | Monday, November 25, 2013

Protect the integrity of your documents: Monday Productivity Pointers

Protect the integrity of your documents with PDF files

Explore Monday Productivity Pointers at lynda.com.

Your business may involve creating and sending contracts to your clients—but the problem with using Microsoft Word documents for contracts is that they can be easily altered. It’s important to know when you receive a contract back from your clients that it’s the exact same contract you sent them.

In this week’s Monday Productivity Pointers, I’m going to show you how easy it is to turn your Word document into an unalterable PDF file right from within Microsoft Word. While it’s not impossible to alter a PDF file, it’s far more challenging, which is why PDF is becoming the industry standard file format for sending contracts over email.

By Jess Stratton | Monday, August 19, 2013

Firewalls and the Cloud: Monday Productivity Pointers

Firewalls and the Cloud

More Monday Productivity Pointers at lynda.com.

In this week’s Monday Productivity Pointers, we’ll take a look at how to secure your computer online to protect your privacy and data. We’ll go back to basics and explore how data travels through the Internet, what a firewall is and how it works, and the types of online threats a firewall can protect you from.

Get the latest news

  •   New course releases
  •   Pro tips and tricks
  •   News and updates
New releases submit clicked

You can change your email preferences at any time. We will never sell your email. More info

Featured articles

A lynda.com membership includes:

Unlimited access to our subscription library courses
Certificates of completion
New courses added every week (almost every day!)
Course history to track your progress
Downloadable practice files
Playlists and bookmarks to organize your learning
Start your free trial

Thanks for signing up.

We’ll send you a confirmation email shortly.

Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

Keep up with news, tips, and latest courses with emails from lynda.com.

Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

submit Lightbox submit clicked
Terms and conditions of use

We've updated our terms and conditions (now called terms of service).Go
Review and accept our updated terms of service.