Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

HostPapa acquires US-based web hosting firm iHost Networks

Image Description

In a bid to expand its reach in the US, Canadian web hosting and cloud service provider HostPapa has acquired iHost Networks for an undisclosed sum. 

Based in Seattle, Washington, iHost was founded in 1996 and focuses on providing web hosting, email services, domains, and on-demand web applications to small business owners, with an emphasis on human-based customer support.

HostPapa, too, provides web hosting services for SMBs worldwide, and has been doing so since 2006. 

iHost is now HostPapa 

iHost reassured its customers that their servers will remain hosted on the west coast of the United States, and as an addition, those businesses will get a server upgrade as HostPapa has made a significant investment in infrastructure.

The company is also promising faster loading times and greater reliability for the SMBs running their websites on their services.

Current iHost customers will not be required to do anything as the firm work on updating its server performance post-acquisition, which is set to be in line with that of servers provided by HostPapa.

When asked about the acquisition, Jamie Opalchuk, HostPapa founder & CEO said: "We'd like to give a warm welcome to iHost customers as they join the HostPapa family.

"Customers from recent acquisitions, including Silicon Valley Web Hosting and Canvas Host, have experienced a seamless transition to HostPapa. We're certain that iHost customers, too, will see immediate improvements in website performance and customer support availability."

The deal came shortly after HostPapa announced a $1.1 million in financing deal with managed WordPress hosting provider Rocket.net two weeks ago.

Date

02 Jun 2021

Sources


Share


Other Blog

  • AMD’s DLSS rival could arrive in June – and might seriously worry Nvidia

    Frame rate boosting tech could be (relatively) easy to implement for developers.

    Read More
  • Office 2021 release date and features revealed - here's all you need to know

    Office 2021 is releasing alongside Windows 11 and will include several features previously only available in Microsoft 365.

    Read More
  • One of the largest internet outages ever recorded occurred this weekend

    US ISP CenturyLink suffered a major technical outage that brought down many popular sites and services.

    Read More
  • Nasty new malware will seize control of your social media accounts

    Cybersecurity researchers from Check Point Research (CPR) have found a new malware circulating around the web that is capable of taking over the victim’s social media accounts, and using them for promotion and monetary gain.

    The researchers sayithe malware, which they named Electron-bot, is being distributed through the Microsoft store. On the store, “several” malicious publishers created a number of games and apps which carry the virus, including relatively popular titles such as Temple Run, or Subway Surfer. 

    Once installed, the “game” downloads files, and executes scripts, all with the goal of gaining persistence, and avoiding detection, on the endpoint

    TechRadar needs you!

    We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time, and entrants from the UK and US will have the chance to enter a draw for a £100 Amazon gift card (or equivalent in USD). Thank you for taking part.

    >> Click here to start the survey in a new window

    Promoting Bulgarian footballers

    Once that’s completed, it can start with the actual work, which includes SEO poisoning (boosting search engine results for certain, malicious landing pages), Ad Clicking (clicking ads on sites so that the seller of the ad space gets more revenue from the ad network), social media account promotion, as well as online product promotion.

    Apparently, a Bulgarian threat actor is behind the campaign. CPR says. All of the malware’s variants were uploaded to the “mediafire.com” public cloud storage, originating from Bulgaria. The YouTube and SoundCloud accounts being promoted through the malware campaign belong to a Bulgarian wrestler and soccer player, while Bulgaria, as a country, is the most promoted one in the source code.

    A total of 5,000 endpoints are already affected, the researchers are saying. The bulk of those are located in Sweden, Bermuda, Israel, and Spain, although the victims are scattered around 20 countries. 

    CPR has warned users to be vigilant when downloading apps, even from legitimate sources, and to look at the number of reviews, downloads, as well as for potential typos in the name of the game or the publisher, hinting that even in the most well-guarded app stores, malicious actors can sometimes slip through the cracks.

    “Most people think that you can trust application store reviews, and they don't hesitate to download an application from there. There's incredible risk with that, as you never know what malicious items you can be downloading,” noted Daniel Alima, Malware Analyst at Check Point Research.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us