During a recent investigation, we found an infected website was redirecting to YouTube after its main index.php file had been modified to include the following line of HTML: <meta http-equiv=’refresh’ content=’2;url=https://youtu.be/fsqzjDAO2Ug’> This technique works because it’s possible to use HTML…
It’s no secret that a secure sockets layer (SSL) encrypts data as it moves between a visitor’s browser and the site host. For many people, a single SSL appears to be sufficient for protecting data exchanged between visitors and their…
Do you want to create a secure form in WordPress? Forms allow users to submit information on your website. However, they can also be used by hackers to steal information, attack websites, and install malicious code. In this article, we…
WordPress security is like a ticking time bomb. You can never know when it’ll go off. Thousands…
The threat landscape for website owners is constantly shifting on a regular basis — and it’s becoming increasingly more complex. As attackers continue to develop tools and find new vulnerabilities to massively exploit, our team works diligently around the clock…
Protecting our users’ information and privacy is extremely important to us. As a cloud-based security service, we’re fully committed to complying with the requirements of the California Consumer Privacy Act (CCPA) along with other global data protection laws and regulations.…