You’re smart. You don’t use passwords like the perennial 123456 and qwerty. Or even slightly better ones, like Cassie86 or Cubs1908. Because you put some thought into them, your passwords are better than those, right?
Maybe. But unless you avoid a little-known mistake recently uncovered by password researchers, there’s a good chance your passwords will still be far easier for hackers to crack than you think.
WordPress users are strongly encouraged to update their sites to 3.9.2 as it’s a security focused release. According to the announcement, 3.9.2 fixes a possible denial of service issue in PHP’s XML processing.
According to stats on WordPress.org, 26.8% of all WordPress sites will not be auto updated. Among those sites, 18.8% are still using WordPress 3.5.
WordPress 3.9.2 has a few other security updates as well:
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
With news breaking on Monday, April 7th that the Heartbleed bug causes a vulnerability in the OpenSSL cryptographic library, which is used by roughly two-thirds of all websites on the Internet. We recommend everyone with a Yahoo.com account, OkCupid.com or Github.com account changes their password. You can check a site here:
Almost every successful hack of a WordPress site exploits one or more of the four main points of vulnerability:
Host security breach
Out-of-date WordPress Core
Unsafe plugins and themes
Brute force attack
If you don’t manage these areas well, then any additional security measures you take will be in vain. You most valuable security tool is good management of your WordPress site.
What is Flashback, and how does OpenDNS protect me?
The Internet is abuzz with news about Flashback, because until very recently it was commonly believed that Macs are largely immune to malware and attacks. Some reported numbers about infections are as high as 600,000, with a reported 56% of those infections on U.S. soil. Flashback was first discovered in September of last year, when it was designed to look like a Adobe Flash update (hence its name). But as of this month, it’s now infecting users that visit compromised websites. Once infected, the malware will attempt to connect to a server for command and control. Flashback has a built-in algorithm, which calculates the domain for C&C.
worried about mac malware?