{"id":194,"date":"2015-06-04T21:27:23","date_gmt":"2015-06-04T21:27:23","guid":{"rendered":"http:\/\/www.ahosting.net\/blog\/?p=194"},"modified":"2025-10-20T10:28:02","modified_gmt":"2025-10-20T10:28:02","slug":"its-important-to-see-to-security-on-wordpress","status":"publish","type":"post","link":"https:\/\/www.ahosting.net\/blog\/its-important-to-see-to-security-on-wordpress\/","title":{"rendered":"Why It\u2019s Now More Important Than Ever To See To Security On Your WordPress Blog"},"content":{"rendered":"<p>According to a report from CodeGuard, <a href=\"http:\/\/dazeinfo.com\/2015\/05\/13\/top-cms-wordpress-themes-plugins-study\/\">WordPress now powers 79% of content-driven websites<\/a>. By comparison, Joomla powers 7.2%, and Drupal 5.3%. The report further notes that designers and developers are flocking to the platform in droves; it\u2019s gained more popularity in that market than it has among bloggers.<!--more--><\/p>\n<p>That popularity is a double-edged sword. On the one hand, the volume of WordPress users means more plugins, more themes, and better support. On the other, it also makes the platform that much more attractive a target for cyber-criminals.<\/p>\n<p>To that end, there\u2019s a distressing new type of attack making the rounds on the web &#8211; a piece of malware, to be precise. What makes it so problematic is that it doesn\u2019t behave like any other WordPress malware. It doesn\u2019t try to install anything on a user\u2019s machine.<\/p>\n<p>It attempts to steal the user\u2019s login credentials instead.<\/p>\n<p>\u201cWhen unsuspecting users attempt to login to one of the compromised WordPress sites, they are served injected JavaScript code as part of the login page,\u201d <a href=\"http:\/\/research.zscaler.com\/2015\/05\/compromised-wordpress-sites-leaking.html\">explains Zscaler, the firm which first broke news of the malware.<\/a> \u201cThe end user is oblivious to the fact that the credentials were leaked to a remote attacker\u2019s site, as he is redirected to a successful logged in session.\u201d<\/p>\n<p>I\u2019d imagine there will be a fix for this vulnerability coming in short order. At the moment, however, the only defense against the infection is due diligence. Website owners can check to see if their site is compromised by searching for the code in question, as well.<\/p>\n<p>It\u2019s the same old song and dance we\u2019ve heard a thousand times before. This time it\u2019s malware. Last week, it was a plugin vulnerability. Then a glitch. Then more malware. Then brute forcing. Then\u2026<\/p>\n<p>You get the idea. WordPress attacks and vulnerabilities surface with such frequency, one can\u2019t help but wonder why anyone uses the platform at all. Is ease of use really worth the security risks?<\/p>\n<p>Honestly, the risks aren\u2019t as great as everyone makes them out to be. The reason we see so many vulnerabilities on WordPress &#8211; the reason it\u2019s targeted so frequently &#8211; is because of its popularity. That\u2019s it. If it were Joomla or Drupal in WordPress\u2019s place, it\u2019d be the same story.<\/p>\n<p>Of course, just because the vulnerabilities aren\u2019t as pronounced as everyone makes them out to be, doesn\u2019t mean you shouldn\u2019t be taking measures to keep your site secure. You should be doing everything in your power to do so, actually. There are a few steps involved in this:<\/p>\n<ul>\n<li><b>Be Proactive: <\/b>Don\u2019t wait to update. Install patches, hotfixes, and new versions as soon as humanly possible. They were released for a reason, after all.<\/li>\n<\/ul>\n<ul>\n<li><b>Be Smart:<\/b> Use strong passwords, and never use the same credentials for one site as you do for another. Make sure you install antivirus software on your site, and be sure to regularly check it for unusual behavior.<\/li>\n<\/ul>\n<ul>\n<li><b>Be Discerning:<\/b> Avoid installing plugins or themes from unregulated, third-party sites &#8211; and <b>never <\/b>pirate premium plugins and themes. That\u2019s just inviting your site to get infected.<\/li>\n<\/ul>\n<ul>\n<li><b>Be Informed:<\/b> Follow the news to keep yourself apprised of newly-discovered vulnerabilities and attacks. Know how people are likely to attack your site, and how you can defend yourself.<\/li>\n<\/ul>\n<p>WordPress is the most popular content management system in the world &#8211; which means it\u2019s also the most popular target for criminals. As a website owner, it falls to you to make sure your own site isn\u2019t an attractive target. Take charge of your security, or you\u2019ll have only yourself to blame if your site gets compromised.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a report from CodeGuard, WordPress now powers 79% of content-driven websites. By comparison, Joomla powers 7.2%, and Drupal 5.3%. The report further notes that designers and developers are flocking to the platform in droves; it\u2019s gained more popularity in that market than it has among bloggers.<\/p>\n","protected":false},"author":2,"featured_media":195,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-194","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wordpress"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/posts\/194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/comments?post=194"}],"version-history":[{"count":2,"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/posts\/194\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/posts\/194\/revisions\/277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/media\/195"}],"wp:attachment":[{"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/media?parent=194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/categories?post=194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ahosting.net\/blog\/wp-json\/wp\/v2\/tags?post=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}