Affordable Web Hosting, Website Design, Software Dev, Online Advertising
From Our Blog
  • HOME »
  • From Our Blog »
  • Security

Security

What Hackers Do With Compromised WordPress Sites

Defaced Site / Took Offline In some cases hackers replace your content with their own. The most common was political content from terrorist groups and the like. The next most common was hackers simply bragging that they hacked your site. In all of these cases the attacker is doing absolutely nothing to obscure what they …

How Attackers Gain Access to WordPress Sites

Plugins Are Your Biggest Risk Plugins play a big part in making WordPress as popular as it is today. As of this writing there are 43,719 plugins available for download in the official WordPress plugin directory. That is an incredible selection of plug and play software. But you obviously need to be careful with them, …

6 Million Password Attacks in 16 Hours and How to Block Them

Last week in the President’s cyber security op-ed in the Wall Street Journal he implored Americans to move beyond simple passwords and to enable two factor authentication or cellphone sign-in. One of the things we monitor at Wordfence is the number of brute force attacks on WordPress websites. Brute force attacks are password guessing attacks, where an …

Apple says No to FBI request to hack terrorist’s iphone

Apple Inc. CEO Tim Cook said that the FBI request that the company develop software to hack into one of its own devices, an iPhone 5c, used by gunman Syed Rizwan Farook, would set a dangerous precedent that could compromise security for billions of customers. The government, Cook contends, is asking Apple to create a …

Hospital pays $17,000 ransom to malware hackers

The Hollywood Presbyterian Medical Center has paid a ransom of $17,000 to hackers who managed to install a malware on the hospitals computers. The ransom was paid in bitcoins, the crypto currency that is practically impossible to trace and is the choice currency for under-the-radar cyber transactions by cyber criminals. “The malware locks systems by …

Why is it beneficial to have a dedicated IP address

What is Dedicated IP Address? IP stands for Internet Protocol and is defined as unique address assigned to each computer that is connected to a certain network. Internet Protocol address plays the role of unique identifier that is used to provide actual location of a machine or a website in a given network. What is …

Beware of the ransomware called Locky

A new ransomware named “Locky” is currently circulating in the wild and making the headlines. There are some good reports regarding Locky ransomware already available over the Internet. This blog intends to focus on some technical areas that (we believe) have not been covered yet, namely, its domain generation algorithm, command and control communication, and …

This Is GBConcepts

GBConcepts is a firm that provides reliable Information and Communication Technology services. Our range of services are designed to offer our clients the best services available. At GBConcepts we have elevated website design, web hosting, database development and e-commerce to an art. These Services have been made very affordable and within the reach of everyone. …

PAGETOP
Copyright © GBConcepts Online Services All Rights Reserved.
Powered by GBConcepts Online