Blog

rss

Spydamonkey Digital Blog

Stay up to date and in touch with what's happening at Spydamonkey Digital and in the world of technology, online security, design and development.

Skills.jpg

5 Website-Related Skills Your Clients Should Know

A big part of web design is in implementing creative solutions. One area that requires a lot of attention is in making things easier for clients to manage. This often comes with the use and customization of a CMS such as DNN. But fully autonomous websites aren’t really a thing yet. So, no matter how much customization we’ve done, clients are still going to need to do some things for themselves. There are a number of tasks that they just can’t escape. That’s why it’s vital for them to have at least a working knowledge of some common skills. Just as important, we need to communicate these requirements and, if necessary, help guide them on the path to learning. After all, they may not even be fully aware of what’s involved. With that in mind, here are five such web-related skills that clients will need to get the most out of their website.
Ups-and-Downs.jpg

The Ups and Downs of Being a Self-Taught Web Designer

Not so long ago, web design was a brand-new industry. Because it was so new, there weren’t many opportunities to get a formal education on its fundamentals. Thus, the most direct path to becoming a professional was to teach yourself the necessary skills. That’s how my career started. I studied the source code of different websites and figured out how things worked. I experimented with Photoshop, CSS and eventually other, more challenging languages. Over the years, most of what I know has come from the process of trial and error.
Houdini.jpg

Houdini Worm targeting commercial banking customers

A new variant of Houdini Worm has been identified targeting commercial banking customers with campaigns containing malicious files. The variant takes five days to actively distribute phishing to victims with the aim of obtaining banking credentials which can be exploited by attackers to make fraudulent purchases. The email attachment contains an MHT file that can be utilised by threat operators in the same way as HTML files.

.