Page 6/14

How to check individual WordPress plugins for vulnerabilities

How to check individual WordPress plugins for vulnerabilities

It is said that 60% of WordPress hacks are program (theme or plugin) vulnerabilities. We will explain how to check for vulnerabilities in your plugins individually.

Read more

5 characteristics of sites that are subject to WordPress hacking, hijacking, or defacement.

5 characteristics of sites that are subject to WordPress hacking, hijacking, or defacement.

At WordPress Doctor, we perform malware removal and security measures on behalf of more than several hundred sites per year. Based on this experience, we would like to share with you the characteristics of sites that have been hacked, hijacked, or defaced.

Read more

How to Prevent WordPress Site-to-Site Malware Infection

How to Prevent WordPress Site-to-Site Malware Infection

Taking advantage of the convenience of being able to operate multiple domain sites under a single server contract, malware today often analyzes the server folder structure and spreads infection from one site to the folders of other sites (domains).

Read more

Serious Vulnerability in WordPress Jetpack Plugin

Serious Vulnerability in WordPress Jetpack Plugin

A serious vulnerability has been discovered in the Jetpack plugin for WordPress and a version update has been distributed. This section explains how to deal with this vulnerability.

Read more

10 files in which malformed JAVASCRIPT code is embedded when WordPress is tampered with.

10 files in which malformed JAVASCRIPT code is embedded when WordPress is tampered with.

This section describes a file in which redirect hack code is often embedded, which causes a WordPress-created site to jump to another site when accessed (redirect).

Read more

How to limit the computers that can log in to the WordPress admin screen by IP

How to limit the computers that can log in to the WordPress admin screen by IP

This section explains how to limit the computers that can log in to the WordPress admin screen by IP.

Read more

How do I stop process-resident malware in WordPress?

How do I stop process-resident malware in WordPress?

Some of today’s malware is of the type that writes an infinite loop (or delayed process) into the server process and resides there.

Read more

File names commonly seen these days in WordPress malware

File names commonly seen these days in WordPress malware

Here are some common malware (virus) file names that WordPress Doctor has discovered recently.

Read more

PHP programming to prevent SQL injection in WordPress

PHP programming to prevent SQL injection in WordPress

Here is a small PHP programming trick to prevent SQL injection in WordPress.

Read more

Five types of malware embedded in WordPress

Five types of malware embedded in WordPress

Here are some of the types of malware embedded in WordPress that are common these days. If similar code is included in the site’s program, we suspect that WordPress has been hacked and tampered with.

Read more

Is a WordPress site restored from a backup prior to malware infection safe?

Is a WordPress site restored from a backup prior to malware infection safe?

WordPress Doctor received the question, “Is a WordPress site restored from a backup prior to a malware infection safe?” This section explains whether or not a WordPress site restored from a backup prior to a malware infection is safe.

Read more

Unauthorized installation of a plugin that can execute PHP code in WordPress.

Unauthorized installation of a plugin that can execute PHP code in WordPress.

A new type of malware has been reported that illegally installs a plugin that can execute PHP code in WordPress and embeds malware in the database.

Read more

Can malware be removed by updating wordpress and plugins?

Can malware be removed by updating wordpress and plugins?

When WordPress is infected with malware (tampered with), updating WordPress and plug-ins may not remove the malware.

Read more

What is Content Security Policy CSP? How to set it up in WordPress

What is Content Security Policy CSP? How to set it up in WordPress

Content Security Policy and how to set it up in WordPress.

Read more

Repair HTACCESS and Index.php, which is instantly tampered with again in WordPress.

Repair HTACCESS and Index.php, which is instantly tampered with again in WordPress.

Due to many requests, we are releasing a program to repair HTACCESS and Index.php, which is instantly tampered with again in WordPress.

Read more

IDs, email addresses of unauthorized users of WordPress

IDs, email addresses of unauthorized users of WordPress

One of the methods of WordPress hacking is for hackers to manipulate the database and add unauthorized users without permission. We recommend that you regularly check your WordPress account to ensure that no unauthorized users have been added to your account.

Read more

What is a WordPress injection attack?

What is a WordPress injection attack?

There are various methods by which WordPress can be hacked, the most common of which is called an injection attack. This section describes these injection attacks.

Read more

Can a hacker attack on WordPress itself be prevented?

Can a hacker attack on WordPress itself be prevented?

Our client asked us if we could prevent the attacks themselves, since hackers have not stopped attacking them. Here is an explanation.

Read more

Page 6/14