Category: SiteLock Research Page 1 of 6

malicious plugin

Getting Dorky: How bad actors can leverage Google Dorks for attacks

If you are like most people, you use Google to search the internet for news, recipes, and pictures of cats. You type in your query, search, and most likely select the first link that Google returns. If you are a savvy user, you know how to use a colon to search specific sites or quotes to find specific words in your search. If you are a hacker, you most likely know how to Google Dork.

Google Dorking, or “Google Hacking,” got its start back in the early 2000s when a hacker realized Google could be used to uncover sensitive data with well-crafted queries. Fast forward to today, and the Google Hacking Database is brimming with over five thousand queries that can be used to find vulnerable information.

Read More

Building a Secure Website In 30 Minutes Or Less

When building a business website or blog, it’s essential to make your website’s security a top priority. In addition to learning how to build a website, any small business owner or blogger should understand how to secure their website. Although the topic of website security might sound complicated, it doesn’t need to be a long, drawn-out process. Today’s post will cover useful tips for building a secure website or blog in thirty minutes or less.

1. Keep Your Website Up-To-Date

Read More

How Small Businesses Can Determine Website Security Risk

Cybercrime’s unprecedented reach means that virtually every website is “at risk.” But how can you gauge your site’s risk level?

The SiteLock Risk Assessment is a predictive model that examines 500 variables to determine cybersecurity risks. It leverages the SiteLock threat database, which is built from more than 12 million protected sites. The variables fall into three key categories: complexity, composition, and popularity. Each category is rated as either high, medium, or low risk. According to our research, sites with a higher risk are 12 times more likely to be exploited than those with low risk.

Read More

SiteLock© INFINITY™ Patches the Joomla! Contact Form Vulnerability

Joomla! released version 3.9.11 on August 13, 2019, to patch vulnerabilities found within versions 1.6.2 and 3.9.10. This latest security update fixes a vulnerability that allows for mail submission in disabled forms. 

Prior to this patch, it was possible for anyone to submit a mail submission to a form even if it was disabled. Com_contact is activated by default in Joomla! installations. This means any user running Joomla! versions 1.6.2-3.9.10 are affected by this vulnerability. With no contacts established or the functionality is disabled, the plugin should not have the ability to send an email, however, with this particular vulnerability it can still send spam emails.

Read More

The 2019 Database Gold Rush

The California Gold Rush began in 1848 when James W. Marshall discovered gold at Sutter’s Mill in Coloma, California. Just over 170 years later, we are experiencing a similar rush, only this time it is data being mined, instead of gold. The data gold rush may have had a slower start, but the value to those who are doing the mining is similar.

What Makes Databases So Valuable?

Read More

Free Webinar: Security Trends Impacting Your Website

Please join SiteLock for our next webinar as we examine the latest cybersecurity trends and data from our 2019 Website Security Report.

The report analyzes more than 6 million websites to determine the most prevalent cyberthreats websites face today, and provides unique insight into the top website risk factors and emerging trends for 2019. 

Hosted by SiteLock Product Marketing Specialist, Monique Becent, the webinar will cover: 

Read More

SiteLock Website Security Insider Q2 2018

The SiteLock Website Security Insider Q2 2018

Did you know that websites experience an average of 58 attacks per day? That’s one cyberattack approximately every 25 minutes! Even more startling, as much as 61 percent of all internet traffic is automated traffic from bots, meaning these attacks do not discriminate based on the size or popularity of a website. No website is too small or too new to hack.

Read More

SiteLock Website Security Insider Q1 2018

The Secret Life of Websites: The SiteLock Website Security Insider Q1 2018

Breaking news: No website is too small to hide from a cyberattack.

Enterprises and big brands may receive unwanted publicity for cyberattacks and data breaches, but smaller doesn’t mean safer. In fact, website attacks increased 14 percent in Q1 2018 compared to Q4 2017 as cybercriminals set their sights on independent websites and small businesses. A successful attack can result in a loss of revenue, a drop in traffic, and damage to the business or website’s reputation. The good news is? There are easy and effective ways website owners can protect their sites and reduce their risk. Knowing what you’re up against is the first step to creating a safe experience for your website and visitors.

The SiteLock Website Security Insider Q1 2018 analyzes data from over 10 million websites to pinpoint the threats website owners need to be aware of. As a new feature to the report, SiteLock surveyed 250 website owners to assess their knowledge and preparedness of cybersecurity. Below are some of the key findings and first steps to securing your website. For more insights and actionable advice for all website owners, download the full report.

Read More

Malware

Pluginsmonsters Fake Plugin Allows Access to WordPress Sites

The SiteLock Research team has become aware of sites infected with fake WordPress plugins that provide cybercriminals with backdoor access and allow them to inject malicious content onto web pages. Below is a high-level overview of the plugins and malware being detected by our scanners and analyzed by SiteLock Research analysts. We also cover effective tips to help protect your site.

Read More

Nancy and the Terrible Tale of Malware [Infographic]

It’s a small business owner’s worst nightmare! What happens when Nancy’s website is hacked by cybercriminals? How will her business recover? Find out in our latest infographic! 

Read More

Page 1 of 6