For a long time, we have been observing increasingly frequent attacks involving attempts to log into WordPress. It’s about trying to break a password. These are references to the address /wp-admin but most of itContinue reading
Category: Security
Spam from the default Joomla form
In recent days there has been a trend in spamming which uses the default form in Joomla! and spam is sent using it. Most of the users only hide this default form, however, hiding itContinue reading
How to protect WordPress – an example of break-in and protection against infection
Gaps happen in every software. The more popular, the greater the chance that someone will find a gap in it. An example of such gap has recently been present in the very popular GDPR ComplianceContinue reading
A dangerous vulnerability in WP GDPR Compliance plugin
A major security flaw was detected in the WP GDPR Compliance plugin. Sites with a version lower than 1.4.3 installed are exposed to an unauthorized creation of an account with administrator privileges in WordPress. TheContinue reading
Do you use the Duplicator plugin? Be sure to read it!
Duplicator is a popular backup plugin (over 1 million downloads), site cloning or migration. Unfortunately, vulnerability has recently been detected that allows remote code execution. What can such an attack manifest itself? If strange contentContinue reading
The end of PHP 5.6.x and PHP 7.0.x support – December 2018
The matter is very simple. In December 2018, official support for PHP security fixes for two versions of PHP 5.6.x (end of support December 31, 2018) and PHP 7.0.x (end of support on December 3,Continue reading
Why is allowing a remote connection to MySQL a very bad idea?
Connection to a remote MySQL database Remote connection to the MySQL database used by the “MySQL remote database” function available in cPanel is unencrypted by default. This is due to the fact that MySQL inContinue reading
Turning on the SSL certificate in WordPress – guide
Turning on the SSL certificate in WordPress If You want your site working on secure connection, or the method you use does not work fully, I encourage you to read this guide. A secure, encryptedContinue reading
How does http/2 work and what can be gained with it?
The http 1.x protocol – a word about history HTTP 1.x is a protocol that was created over 25 years ago and though outdated, it is still widely used on the internet. The current standardContinue reading
Anti-exploit scan report in 2016
All files on Smarthost.pl servers are protected by a unique anti-exploit system. The system in real time supervises the modification of user’s files and makes sure that no files containing harmful software are uploaded. TheContinue reading