Tag: WordPress database Page 1/5

The 3 most targeted and most dangerous vulnerabilities in WordPress

The 3 most targeted and most dangerous vulnerabilities in WordPress

The following are the three vulnerabilities that are most likely to be exploited if discovered on a WordPress site. If your site contains any plug-ins or other components that are vulnerable to these vulnerabilities, we recommend that you take action as soon as possible.

Read more

What are the essential features of the WordPress security plugin?

What are the essential features of the WordPress security plugin?

This section describes the features that should be implemented in the WordPress security plugin.

Read more

WordPress upgrade.php and install.php leaking wordpress version issue

WordPress upgrade.php and install.php leaking wordpress version issue

This section describes the problem of wordpress upgrade.php and install.php leaking the wordpress version and how to deal with it.

Read more

Glossary of common vulnerability attacks in WordPress

Glossary of common vulnerability attacks in WordPress

This is a brief glossary of common vulnerability attacks on WordPress.

Read more

Are there pages registered in Google Search Console that I don't remember creating?

Are there pages registered in Google Search Console that I don’t remember creating?

If a page you do not remember creating is registered in Google Search Console, it is possible that your WordPress site was infected with malware and generated a malicious page.

Read more

Minimum security precautions for WordPress site management

Minimum security precautions for WordPress site management

Here are five minimum security precautions to take when managing a WordPress site. In our experience, this will prevent more than 90% of hacking attempts.

Read more

Can the hacking (defacing) of a WordPress site lead to a case for damages for users who accessed the site?

Can the hacking (defacing) of a WordPress site lead to a case for damages for users who accessed the site?

We would like to talk about whether hacking (tampering) with a WordPress site can lead to a case for damages for users who access the site, based on our experience.

Read more

Malware using text copy and paste service in WordPress

Malware using text copy and paste service in WordPress

This section describes malware that uses a text copy and paste service in WordPress.

Read more

Will WordPress malware removal restore contaminated search results?

Will WordPress malware removal restore contaminated search results?

There is a type of WordPress malware that registers fraudulent e-commerce site pages in Google search results without permission. We will explain whether (and when) such malicious search results disappear after the malware is removed.

Read more

What is a web shell, a piece of malware that can be installed via a vulnerability in WordPress?

What is a web shell, a piece of malware that can be installed via a vulnerability in WordPress?

This section describes a web shell that can be installed via a vulnerability in WordPress.

Read more

Regarding the update of the vulnerability database of our malware scan plug-ins

Regarding the update of the vulnerability database of our malware scan plug-ins

We are currently unable to update the vulnerability database of our malware scan plug-ins due to the fact that NIST has stopped updating the database.

Read more

If you have unused or abandoned WordPress sites on your server, we recommend that you delete them.

If you have unused or abandoned WordPress sites on your server, we recommend that you delete them.

If you have unused or abandoned WordPress sites on your server, we recommend that you delete them. We will explain the reasons for this and how to delete an abandoned site.

Read more

If you do not know where the malware infected malware is located or if you cannot find it

If you do not know where the malware infected malware is located or if you cannot find it

This section explains what to do if you do not know the location of infected malware or if you cannot find it.

Read more

How to find backdoors in a hacked and defaced WordPress site

How to find backdoors in a hacked and defaced WordPress site

We will explain how to find backdoors in a hacked and defaced WordPress site.

Read more

WordPress hacked to leak customer information?

WordPress hacked to leak customer information?

This section explains how WordPress customer information can be leaked if WordPress is hacked.

Read more

Can WordPress malware infect database data?

Can WordPress malware infect database data?

We will explain how an infection (tampering) with the WordPress database can cause the files on the site (server) to be tampered with.

Read more

WordPress outputting user login ID and ID number in JSON issue

WordPress outputting user login ID and ID number in JSON issue

WordPress outputs user login IDs and ID numbers in JSON. Although this is a specification, it may make your site more vulnerable to hackers for security reasons.

Read more

What to do if there is a user 123@abc.com in WordPress that you don't remember creating.

What to do if there is a user 123@abc.com in WordPress that you don’t remember creating.

User 123@abc.com, which you don’t remember creating in WordPress, is an admin user that hackers add illegally.

Read more

Page 1/5