Tag: WordPress check Page 3/7

5 characteristics of sites that are subject to WordPress hacking, hijacking, or defacement.

5 characteristics of sites that are subject to WordPress hacking, hijacking, or defacement.

At WordPress Doctor, we perform malware removal and security measures on behalf of more than several hundred sites per year. Based on this experience, we would like to share with you the characteristics of sites that have been hacked, hijacked, or defaced.

Read more

How to Prevent WordPress Site-to-Site Malware Infection

How to Prevent WordPress Site-to-Site Malware Infection

Taking advantage of the convenience of being able to operate multiple domain sites under a single server contract, malware today often analyzes the server folder structure and spreads infection from one site to the folders of other sites (domains).

Read more

Serious Vulnerability in WordPress Jetpack Plugin

Serious Vulnerability in WordPress Jetpack Plugin

A serious vulnerability has been discovered in the Jetpack plugin for WordPress and a version update has been distributed. This section explains how to deal with this vulnerability.

Read more

How to limit the computers that can log in to the WordPress admin screen by IP

How to limit the computers that can log in to the WordPress admin screen by IP

This section explains how to limit the computers that can log in to the WordPress admin screen by IP.

Read more

Five types of malware embedded in WordPress

Five types of malware embedded in WordPress

Here are some of the types of malware embedded in WordPress that are common these days. If similar code is included in the site’s program, we suspect that WordPress has been hacked and tampered with.

Read more

Unauthorized installation of a plugin that can execute PHP code in WordPress.

Unauthorized installation of a plugin that can execute PHP code in WordPress.

A new type of malware has been reported that illegally installs a plugin that can execute PHP code in WordPress and embeds malware in the database.

Read more

What is Content Security Policy CSP? How to set it up in WordPress

What is Content Security Policy CSP? How to set it up in WordPress

Content Security Policy and how to set it up in WordPress.

Read more

IDs, email addresses of unauthorized users of WordPress

IDs, email addresses of unauthorized users of WordPress

One of the methods of WordPress hacking is for hackers to manipulate the database and add unauthorized users without permission. We recommend that you regularly check your WordPress account to ensure that no unauthorized users have been added to your account.

Read more

What is a WordPress injection attack?

What is a WordPress injection attack?

There are various methods by which WordPress can be hacked, the most common of which is called an injection attack. This section describes these injection attacks.

Read more

How to check individual WordPress themes and plugins for vulnerabilities

How to check individual WordPress themes and plugins for vulnerabilities

Here are some ways to check for vulnerabilities in WordPress themes and plugins.

Read more

Characteristics of malware code when WordPress is tampered with

Characteristics of malware code when WordPress is tampered with

We will explain what kind of malware (programs that perform malicious behavior) can be embedded in a site when WordPress is defaced by hackers.

Read more

It is dangerous to get rid of WordPress malware infected sites one by one!

It is dangerous to get rid of WordPress malware infected sites one by one!

If you have multiple WordPress sites on multiple domains under a single contract, and it is clear that several of them are infected with malware (tampered with), it may be dangerous to repair them one by one.

Read more

Vulnerability CVE-2023-22622 in WordPress 6.1.1 and below

Vulnerability CVE-2023-22622 in WordPress 6.1.1 and below

Recently, the international vulnerability database NIST has released CVE-2023-22622 as a vulnerability in WordPress 6.1.1 and below. The following is an explanation of the results of our investigation.

Read more

5 operations that are at high risk of WordPress sites being hacked and tampered with.

5 operations that are at high risk of WordPress sites being hacked and tampered with.

We will explain the five most dangerous ways to operate a WordPress site that can lead to it being hacked, defaced, sent to another site, or in the form of embedded malware. We hope that you will use this information as a lesson to the contrary.

Read more

What to do when a red warning appears in the browser when accessing your (your company's) WordPress site

What to do when a red warning appears in the browser when accessing your (your company’s) WordPress site

Here is what to do when the browser screen turns red when accessing your (your company’s) site and a warning appears on that screen. Suddenly a warning screen appears when accessing the company’s website. When accessing your company’s website, the browser screen

Read more

If WordPress may be infected with malware (virus or tampering), use the plugin for quick malware inspection and removal.

If WordPress may be infected with malware (virus or tampering), use the plugin for quick malware inspection and removal.

When WordPress may be infected with malware (virus or tampering), you can easily use a plugin to inspect and remove malware. The following is a list of the main types of malware behavior on websites and malware scanning and disinfection plug-ins.

Read more

WordPress is not a dangerous CMS if managed properly

WordPress is not a dangerous CMS if managed properly

WordPress is hacked more often than other CMSs, but this is due to the overwhelming popularity of WordPress itself.

Read more

Clickjack to hijack link clicks on WordPress sites

Clickjack to hijack link clicks on WordPress sites

There has been an increase in the number of malware victims, such as WordPress sites that suddenly send you to another site with a certain probability when you click on a link, the link does not work, or a new window opens and an advertisement appears. We will explain this type o

Read more

Page 3/7