Page 3/14

Regarding the update of the vulnerability database of our malware scan plug-ins

Regarding the update of the vulnerability database of our malware scan plug-ins

We are currently unable to update the vulnerability database of our malware scan plug-ins due to the fact that NIST has stopped updating the database.

Read more

Sitemap Injection, which registers incorrect pages in Google's search results without permission, and how to deal with it.

Sitemap Injection, which registers incorrect pages in Google’s search results without permission, and how to deal with it.

Learn about sitemap injection, which can register incorrect pages from your WordPress site in Google’s search results without your permission, and how to deal with it.

Read more

Why does WordPress malware (tampering) spread to all sites in the server?

Why does WordPress malware (tampering) spread to all sites in the server?

I would like to explain why WordPress malware (tampering) spreads to all sites on the server.

Read more

Spread of malware infection to WordPress sites due to neglect of old Movable Type

Spread of malware infection to WordPress sites due to neglect of old Movable Type

Malware infection is not only a WordPress problem, but is common to all CMS. (WordPress stands out because of its overwhelming popularity, but…) There are an increasing number of cases where old Movable Type is left unattended on a server and malware infection spreads to Wo

Read more

How to restore (decode) a malware file that has infected WordPress?

How to restore (decode) a malware file that has infected WordPress?

We will explain how to restore (decode) a malware file that has infected WordPress.

Read more

If you have unused or abandoned WordPress sites on your server, we recommend that you delete them.

If you have unused or abandoned WordPress sites on your server, we recommend that you delete them.

If you have unused or abandoned WordPress sites on your server, we recommend that you delete them. We will explain the reasons for this and how to delete an abandoned site.

Read more

If you do not know where the malware infected malware is located or if you cannot find it

If you do not know where the malware infected malware is located or if you cannot find it

This section explains what to do if you do not know the location of infected malware or if you cannot find it.

Read more

There are two types of malware that can infect WordPress: those made of javascript and those made of php.

There are two types of malware that can infect WordPress: those made of javascript and those made of php.

There are two types of malware infecting WordPress, one made of javascript and the other made of php.

Read more

How to find backdoors in a hacked and defaced WordPress site

How to find backdoors in a hacked and defaced WordPress site

We will explain how to find backdoors in a hacked and defaced WordPress site.

Read more

Peculiarities of the malware infecting WordPress

Peculiarities of the malware infecting WordPress

Malware that infects WordPress is quite different from ordinary computer viruses. Here is an explanation of what makes them different.

Read more

What if the search console warns me of a large number of non-existent noindexed search result pages on my WordPress site?

What if the search console warns me of a large number of non-existent noindexed search result pages on my WordPress site?

Here is what to do if your WordPress site is being warned by Search Console of a large number of noindexes on non-existent WordPress search results pages.

Read more

WordPress hacked to leak customer information?

WordPress hacked to leak customer information?

This section explains how WordPress customer information can be leaked if WordPress is hacked.

Read more

Can WordPress malware infect database data?

Can WordPress malware infect database data?

We will explain how an infection (tampering) with the WordPress database can cause the files on the site (server) to be tampered with.

Read more

What is admin-ajax.php that is often accessed during wordpress hacks?

What is admin-ajax.php that is often accessed during wordpress hacks?

Hackers target vulnerabilities in WordPress to gain various unauthorized access. The most common of these attacks is against admin-ajax.php.

Read more

WordPress outputting user login ID and ID number in JSON issue

WordPress outputting user login ID and ID number in JSON issue

WordPress outputs user login IDs and ID numbers in JSON. Although this is a specification, it may make your site more vulnerable to hackers for security reasons.

Read more

Malware installed in the top directory of WordPress

Malware installed in the top directory of WordPress

We would like to introduce you to the malware that is installed in the top directory of WordPress.

Read more

What to do if there is a user 123@abc.com in WordPress that you don't remember creating.

What to do if there is a user 123@abc.com in WordPress that you don’t remember creating.

User 123@abc.com, which you don’t remember creating in WordPress, is an admin user that hackers add illegally.

Read more

New WordPress tampering technique, inclusion of .ccss malware

New WordPress tampering technique, inclusion of .ccss malware

The new WordPress tampering technique, the inclusion of .ccss malware, will be explained.

Read more

Page 3/14