Page 12/14

How to find out if an IP accessing your site is a dangerous IP

How to find out if an IP accessing your site is a dangerous IP

This section explains how to find out if an IP is a compromised IP that is hacking from the IP’s access log, login log, or server-side access log in the security plugin for a WordPress site.

Read more

WordPress index.php malware (virus) infection case

WordPress index.php malware (virus) infection case

If you find the following code in some index.php files included in your WordPress site, you are infected with malware and should be careful.

Read more

Block WordPress hacker attacks in real time (before the attack is completed)

Block WordPress hacker attacks in real time (before the attack is completed)

What is the Malware Scan & Security Plug-in Real-time Block function? WordPress Doctor researches and databases what kind of attacks hackers are launching against WordPress on a daily basis. For example, as of May 2021, the following attacks are the most common attacks that W

Read more

What are the symptoms of a WordPress hack? Here are some of the tampering details of various hackers.

What are the symptoms of a WordPress hack? Here are some of the tampering details of various hackers.

1 Back door Vulnerabilities, known as backdoors, allow hackers to install hidden entry points on your site to gain access to your WordPress site through the misuse of server privileges. Once the backdoor is exploited, the hacker can access or rewrite all files on the hosting serv

Read more

5 signs that your WordPress site has been hacked or defaced

5 signs that your WordPress site has been hacked or defaced

Recently, there has been an increase in the number of SEO hacks, a type of site tampering that is difficult to recognize as tampering, rather than hacks or tampering that are easy to understand. In this article, we would like to explain how this type of tampering affects sites.

Read more

WordPress, content from your site is replaced and displayed in search results.

WordPress, content from your site is replaced and displayed in search results.

If your site’s Google search results show a large number of pages that you do not remember creating, it is possible that your site has been tampered with.

Read more

Who is most targeted in WordPress hacking (tampering)?

Who is most targeted in WordPress hacking (tampering)?

Quote kinsta.com Who is most likely to be targeted in a WordPress hack?

Read more

WordPress: How the Malware Scan & Security plugin can detect malware with high accuracy.

WordPress: How the Malware Scan & Security plugin can detect malware with high accuracy.

The following is a partial introduction to the highly accurate malware detection mechanism in the [Free] WordPress: Malware Scanning & Security Plug-in [Malware and Virus Detection and Removal] released by WordPress Doctor.

Read more

WordPress malware, a case study included in Google Tag Manager

WordPress malware, a case study included in Google Tag Manager

Here is an example of an infected Google Tag Manager with symptoms such as a WordPress site redirecting to another site (clicking a button jumps to a different site).

Read more

Log-in-related security measures alone are not enough to prevent WordPress hacking

Log-in-related security measures alone are not enough to prevent WordPress hacking

We understand that many sites have installed various security plug-ins to prevent WordPress hacking, but some plug-ins are specialized for the login screen only. These plug-ins do not provide much protection against WordPress hacking. We will explain why.

Read more

WordPress Causes and Countermeasures when an Unrecognized Page Appears in Search Results

WordPress Causes and Countermeasures when an Unrecognized Page Appears in Search Results

We have recently observed many cases where a product page or a page on our site appears in the search results under the name of your site, which you do not remember. We will explain the causes and countermeasures in this case.

Read more

Log and visualize WordPress hacker attacks

Log and visualize WordPress hacker attacks

Here are some of the most common attack patterns recorded as hacking logs that we detect on a daily basis.

Read more

[Urgent] File Upload Vulnerability in Contact Form 7 v5.3.1 and Below

[Urgent] File Upload Vulnerability in Contact Form 7 v5.3.1 and Below

A file-uploadable (most dangerous) vulnerability was discovered in the Contact Form 7 plugin 5.3.1 and below, which is installed in 5 million sites.

Read more

Reasons for repeated hacker defacement and malware infection on WordPress sites

Reasons for repeated hacker defacement and malware infection on WordPress sites

Once a WordPress site has been defaced by hackers, embedded malware, or infected with a virus, the site may be repeatedly defaced even after you think you have removed the malware. We will explain how to deal with such cases.

Read more

Take a look at the logs of hackers' attacks on WordPress

Take a look at the logs of hackers’ attacks on WordPress

WordPress:Malware Scan & Security Plug-in [Malware and Virus Detection and Removal] has a function to log hacker attacks. We will introduce this feature in this issue.

Read more

Is it dangerous to include many plugins in WordPress for security reasons?

Is it dangerous to include many plugins in WordPress for security reasons?

WordPress is an extremely versatile CMS with over 50,000 free plug-ins that can be used to add functionality to your site. In this article, we will discuss the number and security of plug-ins.

Read more

Most Targeted Plugin Vulnerabilities in WordPress, November 2020 Edition

Most Targeted Plugin Vulnerabilities in WordPress, November 2020 Edition

WordPress Doctor is pleased to inform you of the commonly targeted plugin vulnerabilities in WordPress as of November 2020 that we detect on a daily basis.

Read more

Vulnerability in File Manager Plugin, which allows WordPress to operate like FTP software

Vulnerability in File Manager Plugin, which allows WordPress to operate like FTP software

The File Manager plug-in, which enables file manipulation on the administration screen like FTP software and has been installed on over 700,000 sites, has a very dangerous vulnerability in version 6.9 or lower.

Read more

Page 12/14