arrow_upward

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Watchout and Warning: Malicious WordPress Redirect Campaign Attacking Plugins
#6
this is why i like to keep system files on its own part and mount tmp and other doable mount points as nodev,noexec,nosuid. With a hope that that mitigates some attacks at least.

Also updating regularly and using themes and plugins under active development is a must nowadays. You will have to remain proactive even after that.

Also i think it is not very fruitful to point at guys at wordpress. I am sure they are doing their best. But code bases and projects have become vast nowadays and vulnerabilities are bound to crop up more before everyone starts using some kind of provably safe code (like they do in many realtime mission critical systems). but then that will hamper creativity and collaboration.

we need to remember that these projects are are run by many people together and at various levels. so we will have to be tolerant.

be proactive. may be use better firewall. if it handles sensitive data then may be you should do it yourself or hire peeps.

no point blaming or ditching them. they have their uses.
Sincere Thanks to VirMach for my VPS9. Also many thanks to Shadow Hosting and cubedata for the experiences I had with their VPSs.



person_pin_circle Users browsing this thread: 1 Guest(s)
Sponsors: VirMach - Host4Fun - CubeData - Evolution-Host - HostDare - Hyper Expert - Shadow Hosting - Bladenode - Hostlease - RackNerd - ReadyDedis - Limitless Hosting