Posted by : Unknown
Tuesday, 16 April 2013
Importent If anyone using wordpress web blog or website..read must
: Do you have a WordPress site? If so, right about now would be a great time to check (and double check) that you're using a very secure password. According to a TechCrunch article (based on reports by HostGator and CloudFlare), hackers are pointing a 'large botnet' to target WordPress sites in an attempt to swipe admin passwords and then, to go one step further, take over your server.
"HostGator's analysis found that this is a well-organized and very distributed attack. The company believes that about 90,000 IP addresses are currently involved."
The report suggests that this attack is similar in nature to an attack on WordPress from last year, the difference being the one from 2012 looked for outdated versions of a popular PHP-based image resizer by name of TimThumb. Because this attack's ultimate target is servers, the potential of bandwith the hackers can get access to is much higher than more targeted denial-of-service attacks.
As always, because I think this can't be stressed enough, even strong passwords are crackable, and users' safest option is to use a powerful Password Management tool coupled with great internet security...
: Do you have a WordPress site? If so, right about now would be a great time to check (and double check) that you're using a very secure password. According to a TechCrunch article (based on reports by HostGator and CloudFlare), hackers are pointing a 'large botnet' to target WordPress sites in an attempt to swipe admin passwords and then, to go one step further, take over your server.
"HostGator's analysis found that this is a well-organized and very distributed attack. The company believes that about 90,000 IP addresses are currently involved."
The report suggests that this attack is similar in nature to an attack on WordPress from last year, the difference being the one from 2012 looked for outdated versions of a popular PHP-based image resizer by name of TimThumb. Because this attack's ultimate target is servers, the potential of bandwith the hackers can get access to is much higher than more targeted denial-of-service attacks.
As always, because I think this can't be stressed enough, even strong passwords are crackable, and users' safest option is to use a powerful Password Management tool coupled with great internet security...