Tag: malware

Case Study: Smallbizapalooza

Company Background

Smallbizapalooza.com is one of three websites founded and run by Ivana Taylor. Taylor brings a passion for small business marketing to her many pursuits, striving to share with others the tools and tips she has learned. The concept for Smallbizapalooza was to create a platform where entrepreneurs could engage with brands and experts who are committed small business success. Taylor describes her goal, “The idea was to open a space where experts could share their success strategies, answer small business questions and entrepreneurs could learn about the best books, brands, tools and strategies that could help them succeed.”

Read More

Ask a Security Professional: Malware Analysis Series — Part Four: Detection vs Removal

If you’ve ever seen me at a WordCamp, you’ve probably heard me answer this question, and likely more than once. When it comes to malware scanning on a WordPress website, what makes the SiteLock® malware scanners different from the competition? Well, scanners simply are not created equal. My go-to short answer is typically explaining one of our scanners’ “killer features,” like its ability to automatically remove malware.

Read More

Ask a Security Professional: Malware Analysis Series — Part Three: How is a Signature Born?

Security researchers at security firms like SiteLock® audit code that has been flagged as suspicious, either by individuals or by an automated system performing behavioral analysis (which we’ll talk more about in the next section), to determine whether or not the code is actually malicious. If a file or piece of code is deemed malicious by the security researcher, it enters the database, typically as either a file match signature, or a code snippet signature.

Read More

Ask a Security Professional: Malware Analysis Series — Part Two: Behavioral Analysis

You could consider signature-based analysis to be like a policeman running the plates of every car in a parking lot against the police department’s database of stolen vehicles. While this may be an effective method for finding stolen vehicles, if the license plate on the car has been changed or obscured, the car will most likely be overlooked. Keeping with this analogy, behavioral analysis would be the detective.

Read More

Ask a Security Professional: Malware Analysis Series — Part One: Signature-Based Analysis

Back in February, a colleague and I delivered a talk on website security at WordCamp Miami. Among the many great questions we received both during the talk’s Q&A and at our sponsor booth, one common theme kept reoccurring from attendees: How does malware detection really work?

If you want to check out our WordCamp Miami talk, “Beyond the Basics: Building Security into Your Development Projects,” and the corresponding slides are available online.

Read More

5 signs website hacked

5 Signs Your WordPress Website Has Been Hacked

Being the victim of a website hack isn’t always obvious. Here are five ways to tell if your WordPress website has fallen victim to a hacker, and they’re not what you might expect.

Read More

Page 2 of 2

Powered by WordPress & Theme by Anders Norén