WordPress and Annotum for Education, Science,Journal Publishing
4.7K views | +0 today
Follow
WordPress and Annotum for Education, Science,Journal Publishing
WordPress and Annotum for Education, Science,Professional Journal Publishing with multiple authors and peer-reviews as also Knol to WP Migration...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

WordPress - Brute Force Attacks and Their Consequences

WordPress - Brute Force Attacks and Their Consequences | WordPress and Annotum for Education, Science,Journal Publishing | Scoop.it
There is a lot of interesting discussion going on at the moment across the interwebs on the intention of the latest string of Brute Force attacks, much of which

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security


Gust MEES's insight:

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security


A MUST read to understand the WHY and HOW!!!


Gust MEES's curator insight, April 13, 2013 9:56 AM

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security

 

A MUST read to understand the WHY and HOW!!!

 
Scooped by Gust MEES
Scoop.it!

WordPress blogs and more under global attack - check your passwords now!

WordPress blogs and more under global attack - check your passwords now! | WordPress and Annotum for Education, Science,Journal Publishing | Scoop.it
If you have a web service that supports remote users, you will know that malevolent login attempts are an everyday occurrence.

But hosting providers worldwide are reporting an onslaught at well ...
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Passwords

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Brute Force Attacks Build WordPress Botnet — Krebs on Security

Brute Force Attacks Build WordPress Botnet — Krebs on Security | WordPress and Annotum for Education, Science,Journal Publishing | Scoop.it

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

===> Reinstall WordPress from scratch or revert to a known, safe backup. <===

 

Gust MEES's insight:

 

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

- Reinstall WordPress from scratch or revert to a known, safe backup.

 

Check also:

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=WordPress

 

Gust MEES's curator insight, April 13, 2013 9:20 AM

 

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

- Reinstall WordPress from scratch or revert to a known, safe backup.


Check also:


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=WordPress