FinancesOnline gives WebSitePulse two of their top awards

Posted on May 15th, 2017 by Websitepulse in Industry News, WebSitePulse News

WebSitePulse awards

Brace up for some awesome news: Your favorite remote monitoring system has just won two prestigious productivity awards! The reputed B2B software review platform FinancesOnline.com considered WebSitePulse as the next premium quality addition to their IT management category, and distinguished its performance with even two of their best known awards.

Read more...

Introducing Webpage In-Browser Monitoring

Posted on February 1st, 2016 by Boyana Peeva in WebSitePulse News

We are delighted to announce the launching of our newest service - webpage in-browser monitoring.

Check out the features and see if it's right for you:

Read more...

How to Earn with WebSitePulse

Posted on August 19th, 2015 by Websitepulse in WebSitePulse News

WebSitePulse affiliate program

Looking for an extra income? We’ve got an idea: why don’t you enroll in WebSitePulse affiliate program to start cashing in?

Read more...

Security notification for CVE-2015-0235 (GHOST vulnerability)

Posted on January 28th, 2015 by Websitepulse in Industry News, WebSitePulse News, Tech

GHOST VulnerabilityA significant Linux vulnerability that allows remote code execution to Linux server(s) was announced late yesterday, named GHOST: CVE-2015-023. Full details of the vulnerability are available at www.openwall.com/lists/oss-security/2015/01/27/9. While the issue has been fixed as early as Mar 21, 2013 it was not marked as a security threat and as a result the patch was not backported to most of the stable and long-term-support distributions like RHEL, Centos, Ubuntu 12.04 etc which left them vulnerable.

Updates for CentOS are already available in the Updates repository so a simple "yum update" will install the required patches to mitigate this vulnerability.

Read more...

Security Notification for SSLv3 POODLE Vulnerability

Posted on October 16th, 2014 by Websitepulse in Industry News, WebSitePulse News

SSLv3 POODLE VulnerabilityAs you probably know, a number of news sources, corporations, and the OpenSSL team reported yesterday 14 October 2014 that version 3 of Secure Sockets Layer (SSLv3) is vulnerable at the protocol level. More information about the vulnerability can be found here -  CVE-2014-3566.

To prevent any potential leaks from this vulnerability we have immediately disabled SSLv3 on all our web servers including the API endpoints. Our monitoring agents are not affected by this change and will continue to support SSLv3 for the time being in order to be able to monitor properly servers that do support SSLv3 only. We are urging all customers to disable SSLv3 on hosts interacting with the our services as soon as possible and upgrade to use Transport Layer Service (TLS).

Read more...