Tag: WordPress malware Page 12/13

Vulnerability in File Manager Plugin, which allows WordPress to operate like FTP software

Vulnerability in File Manager Plugin, which allows WordPress to operate like FTP software

The File Manager plug-in, which enables file manipulation on the administration screen like FTP software and has been installed on over 700,000 sites, has a very dangerous vulnerability in version 6.9 or lower.

Read more

Be careful if your WordPress theme or plugin contains class.plugin-modules.php!

Be careful if your WordPress theme or plugin contains class.plugin-modules.php!

We are seeing an increasing number of cases where WordPress themes and plugins that are available for free have a malware called class.plugin-modules.php embedded in them.

Read more

What to do when Google's ad review does not pass (disapproves) due to malware

What to do when Google’s ad review does not pass (disapproves) due to malware

Here is what to do if your Google ads suddenly stop appearing and your AdSence and Adwords screens show “malicious or undesirable software” and your ads are disapproved.

Read more

Example of database tampering with a redirect hack that causes a site to jump to another site

Example of database tampering with a redirect hack that causes a site to jump to another site

Redirect hacks that cause a site to jump to another site (often a malicious software download, a fake e-commerce site, or a site that makes you click on a robot authentication) are not only tampering with files, but also getting into the database. Here are some examples of databa

Read more

Vulnerability in WordPress theme OneTone to rewrite database without authentication

Vulnerability in WordPress theme OneTone to rewrite database without authentication

OneTone, which has a large number of users in Japan, has a vulnerability that rewrites the database without requiring authentication, and many sites have suffered from redirection hacks.

Read more

Find out the most dangerous vulnerabilities in your WordPress!

Find out the most dangerous vulnerabilities in your WordPress!

Common Vulnerability Assessment System CVSS Score Software vulnerabilities have an objective measure of severity called a CVSS score. The CVSS score is basically derived from the following criteria on a 10-point scale.

Read more

How to prevent spam comment posting by robots from HTACCESS files

How to prevent spam comment posting by robots from HTACCESS files

Comment spam (invalid string parties or links written in comments) is a very annoying problem if you have the comment function enabled in WordPress. In this article, we will explain how to prevent spam written via robots (which automatically write comments) from HTACCESS files.

Read more

Where is WordPress being hacked from? Find out the vulnerabilities of plugins and WordPress itself!

Where is WordPress being hacked from? Find out the vulnerabilities of plugins and WordPress itself!

If you have been a victim of WordPress defacement or hacking and have viruses or malware embedded in your site, or if you repeatedly find yourself in a similar situation, you may wonder where hackers are getting into your site. In this article, we will explain how to find vulnera

Read more

How to check individual WordPress plugins for vulnerabilities

How to check individual WordPress plugins for vulnerabilities

Hacking using plug-in vulnerabilities, which account for the majority of WordPress malware infections (tampering damage), has been increasing in recent years. Plug-in vulnerabilities are sometimes fixed by the creators of the plug-ins, so it is advisable to keep all plug-ins up-t

Read more

What if I get infected with malware disguised as an ico file in wordpress?

What if I get infected with malware disguised as an ico file in wordpress?

We will provide an explanation of the malware that disguises itself as an ico file, which has recently been on a rampage, and introduce countermeasures.

Read more

What to do when WordPress is repeatedly tampered with (infected with malware and viruses) due to hacking

What to do when WordPress is repeatedly tampered with (infected with malware and viruses) due to hacking

If you have gone to the trouble of removing viruses and tampering from your WordPress site, but are immediately reinfected (tampering due to hijacking), here are the causes and remedies.

Read more

Learn how hackers rewrite (alter) files on your WordPress site to increase security!

Learn how hackers rewrite (alter) files on your WordPress site to increase security!

As convenience and site functionality increases with the improved capabilities of programs on servers, not just WordPress, tampering with files on servers has become a major problem. In this article, we will explain how hackers rewrite WordPress files and consider ways to improve

Read more

How to prevent hijacking of WordPress admin rights

How to prevent hijacking of WordPress admin rights

WordPress has been increasingly hijacked by hackers, resulting in loss of access to the site, becoming a stepping stone for spam mails, or being redirected to another overseas site. In this article, we will explain how to prevent WordPress hijackers from taking over your WordPres

Read more

How to restrict IP addresses that can log in to WordPress

How to restrict IP addresses that can log in to WordPress

If you are running a WordPress site with a fixed IP and very few administrative users, restricting IP access to the admin screen can be very secure. Restricting access to the admin panel is very easy with the HTACCESS file.

Read more

How to find out if WordPress is infected with malware (virus) or how to locate the file.

How to find out if WordPress is infected with malware (virus) or how to locate the file.

Are you experiencing any symptoms such as WordPress behaving strangely, server administrators notifying you that your site is infected with malware, or spam emails that redirect you to other sites without your permission? We will explain how to check if WordPress is infected with

Read more

WordPress Security Improvement Plugin Vulnerability Edition

WordPress Security Improvement Plugin Vulnerability Edition

One of the most common methods of WordPress hacking is to exploit plugin vulnerabilities. Plugin vulnerabilities can range from serious to minor, such as a link in a spam email that redirects the user. In this article, we will discuss the most serious vulnerability, called “

Read more

What is a WordPress Web Backdoor? We explain its dangers and methods.

What is a WordPress Web Backdoor? We explain its dangers and methods.

What is a backdoor? A so-called backdoor as a computer security term refers to a communication connection feature installed in a computer (without the knowledge of others) to allow unauthorized use of a computer feature that originally used IDs and passwords to verify usage right

Read more

8 characteristics of sites that can be hacked by WordPress

8 characteristics of sites that can be hacked by WordPress

We would like to explain the most common characteristics of the sites we have repaired at WordPress Doctor that have suffered malware damage due to hacker infiltration. If you take the following security measures, you will be able to reduce hacker infiltration to a great extent.

Read more

Page 12/13