It’s been known for some time that healthcare information is a target for hackers, also that the motivation for these thefts has diversified. Such data is now used not only for identity theft but is believed to be targeted by countries such as China for…
WordPress Security Tips Part 10 – Secure Your Debug Logs
During development of plugins or themes, as well as during deployment of a WordPress site, developers or system administrators may enable debug logs to log any PHP errors that occur. WordPress makes use of the WP_DEBUG constant which is defined in wp-config.php. The constant is…
Don’t Let a GHOST Vulnerability Haunt Your Systems
This week a new Linux vulnerability called GHOST (CVE-2015-0235) has been published and subsequently patched, including an update to Acunetix, which can now detect the vulnerability in both its online and on-premises forms, via network scan or web application scan. While some cited GHOST as…
With DDoS attacks on the rise, could you be a botnet zombie?
A report recently published by Imperva has reported that more than half of web traffic comes from bots rather than human visitors. They have also noted some changes in the type of bots observed, including a predictable yet worrying trend in impersonator bots, which now…
WordPress Security Tips Part 8 – Restrict Direct Access to Plugin and Theme PHP files
Allowing direct access to PHP files can be dangerous for a number of reasons. Some plugins and theme files can contain PHP files that are not designed to be called directly because the file would be calling functions that would have been defined in other…
Obama’s State of the Union address highlights cyber security
In the aftermath of the Sony Pictures attack and now the hacking of the Pentagon’s social media accounts, the introduction of tougher cyber security laws has been inevitable. The main points to take from these new laws is that it will no longer be only the attacker…
WordPress Security Tips Part 7 – Enabling HTTPS for all logins and wp-admin
Strictly speaking, HTTPS is not a protocol in and of itself, but it is rather HTTP encapsulated in TLS/SSL. TLS, or SSL, as it is commonly referred to, provides websites and web applications with encryption of data being transmitted and authentication to verify the identity…
WordPress Security Tips Part 6 – Disable File Editing
Disable File Editing By default, WordPress allows administrative users to edit PHP files of plugins and themes inside of the WordPress admin interface. This is often the first thing an attacker would look for if they manage to gain access to an administrative account since…
WordPress Security Tips Part 5 – Restrict Access to wp-admin Directory
Password protecting your WordPress admin area through a layer of HTTP authentication is an effective measure to thwart attackers attempting to guess users’ passwords. Additionally, if attackers manages to steal a user’s password, they will need to get past HTTP authentication in order to gain…