Tag: WordPress security Page 2/13

Investigate unauthorized access to wordpress admin-ajax.php (how to deal with it)

Investigate unauthorized access to wordpress admin-ajax.php (how to deal with it)

We will explain how to investigate unauthorized access to admin-ajax.php in WordPress

Read more

Minimum security precautions for WordPress site management

Minimum security precautions for WordPress site management

Here are five minimum security precautions to take when managing a WordPress site. In our experience, this will prevent more than 90% of hacking attempts.

Read more

What to do if you are unable to download a wordpress plugin

What to do if you are unable to download a wordpress plugin

Here is what to do if you are unable to download a WordPress plugin.

Read more

Why you should test your WordPress plugins for vulnerabilities.

Why you should test your WordPress plugins for vulnerabilities.

Vulnerability testing of WordPress plugins should be performed on a regular basis. We will explain the reasons for this.

Read more

Example of malware spreading to initial subdomain folders of a server

Example of malware spreading to initial subdomain folders of a server

Many of today’s malware spread infection to all folders beyond the domain folders in the server. In this article, we will discuss the infection of initial subdomain folders on unused servers, which is often overlooked.

Read more

What is a brute force attack, a brute force attempt to try and break through a WordPress user's password?

What is a brute force attack, a brute force attempt to try and break through a WordPress user’s password?

This section describes a brute force attack that tries and breaks through WordPress users’ passwords by brute force and how to deal with it.

Read more

Can the hacking (defacing) of a WordPress site lead to a case for damages for users who accessed the site?

Can the hacking (defacing) of a WordPress site lead to a case for damages for users who accessed the site?

We would like to talk about whether hacking (tampering) with a WordPress site can lead to a case for damages for users who access the site, based on our experience.

Read more

Malware using text copy and paste service in WordPress

Malware using text copy and paste service in WordPress

This section describes malware that uses a text copy and paste service in WordPress.

Read more

Top 10 fraudulent user login IDs and email addresses created in WordPress

Top 10 fraudulent user login IDs and email addresses created in WordPress

Around 30% of the WordPress sites we receive these days have rogue WordPress users, and the hacking technique of creating rogue users on WordPress is spreading.

Read more

Malware displays fake Chrome update screen on WordPress site

Malware displays fake Chrome update screen on WordPress site

We will explain a new type of malware that is spreading these days: fake updates.

Read more

How do WordPress hackers find site vulnerabilities and deface sites? What are effective security measures?

How do WordPress hackers find site vulnerabilities and deface sites? What are effective security measures?

When a site is hacked and defaced, some webmasters generally assume that hackers have targeted your site and infiltrated it with advanced technology, but this is not the case with WordPress. This is not the case with WordPress.

Read more

Will WordPress malware removal restore contaminated search results?

Will WordPress malware removal restore contaminated search results?

There is a type of WordPress malware that registers fraudulent e-commerce site pages in Google search results without permission. We will explain whether (and when) such malicious search results disappear after the malware is removed.

Read more

Notes on what to do if multiple WordPress sites across the server have been infected (tampered with) by malware.

Notes on what to do if multiple WordPress sites across the server have been infected (tampered with) by malware.

We will explain the precautions to take when multiple WordPress sites across the server have been infected (tampered with) by malware.

Read more

What is a web shell, a piece of malware that can be installed via a vulnerability in WordPress?

What is a web shell, a piece of malware that can be installed via a vulnerability in WordPress?

This section describes a web shell that can be installed via a vulnerability in WordPress.

Read more

Regarding the update of the vulnerability database of our malware scan plug-ins

Regarding the update of the vulnerability database of our malware scan plug-ins

We are currently unable to update the vulnerability database of our malware scan plug-ins due to the fact that NIST has stopped updating the database.

Read more

Sitemap Injection, which registers incorrect pages in Google's search results without permission, and how to deal with it.

Sitemap Injection, which registers incorrect pages in Google’s search results without permission, and how to deal with it.

Learn about sitemap injection, which can register incorrect pages from your WordPress site in Google’s search results without your permission, and how to deal with it.

Read more

Why does WordPress malware (tampering) spread to all sites in the server?

Why does WordPress malware (tampering) spread to all sites in the server?

I would like to explain why WordPress malware (tampering) spreads to all sites on the server.

Read more

Spread of malware infection to WordPress sites due to neglect of old Movable Type

Spread of malware infection to WordPress sites due to neglect of old Movable Type

Malware infection is not only a WordPress problem, but is common to all CMS. (WordPress stands out because of its overwhelming popularity, but…) There are an increasing number of cases where old Movable Type is left unattended on a server and malware infection spreads to Wo

Read more

Page 2/13