Malware Mistaken Used as a WordPress Plug-in

Malware in WordPress Sites A malware confused as a WordPress plug-in for sites A malware that was mistaken as a WordPress plugin is very alarming, especially to those website owners. Plug-ins are very useful in building a website, but unfortunately, there are already some that are considered as malicious software. Do you own a website? If so, consult a trained techinician or web developer to assist you regarding data and web security. Crawley Computer Centre is of service to you. Video of Malware as WordPress plug-in New Russian Malware Impacts 100,000 WordPress Sites Google blacklisted more than 10,000 domains compromised with a piece of malware dubbed SoakSoak, according to virus researchers. Up to 100,000 WordPress sites may be vulnerable to the malicious campaign, Sucuri said. Any version of WordPress that uses a popular slideshow plugin called “Slider Revolution” or RevSlider can fall victim to SoakSoak. In September, researchers discovered a zero-day vulnerability in the plugin that allows an attacker to download any file from the site’s server, including database credentials, and compromise the website via the database. The problem lies in the way the plugin is wrapped into theme packages. When it becomes part of a theme, RevSlider’s automatic update mechanism is usually disabled and manual updates need to be performed in a process prone to error. Read more here… Source:  Alexandra Gheorghe Image Source:  Phil...

HTTP Sites No Longer a Secure Site Effective Next Year

How Reliable and Secure are these HTTP Sites in the Internet? As you can see, there are two types of website – the HTTP and the HTTPS. HTTPS is more secure than HTTP. Google, as part of its security, no longer wanted these unsecure sites too. Let’s find out what Google are planning to make our browsing safe and secure. HTTP Sites will be recognize as unsecure site by Google. Google Will Mark HTTP Sites As Unsafe Starting in 2015 Google plans to mark all HTTP pages “insecure” to warn users about data security and privacy issues, according to Chromium.org. As part of the open-source Chromium Projects, the initiative will affect Chrome starting in January. It’s meant to encourage all website owners to switch to HTTPS by default. “We all need data communication on the web to be secure (private, authenticated, untampered),” Google’s team said. “When there is no data security, the UA should explicitly display that, so users can make informed decisions about how to interact with an origin.” The Google team suggests browsers define three basic states of security: Secure (valid HTTPS) Dubious (valid HTTPS but with mixed passive resources, valid HTTPS with minor TLS errors) Non-secure (broken HTTPS or HTTP) Also, they recommend “a phased approach to marking non-secure origins as non-secure.” Read more here…. Source:  Alexandra Gheorghe Image Source:  Esparta...

Google CAPTCHA: identifying robots from humans

Google Captcha Google Captchas are for security purposes to prevent spammers   Google Captcha is somewhat useful in such a way that it prevents spammers to avail their services.   Google says bye bye, CAPTCHAs, well, mostly Google announced that the company is trying to get rid of CAPTCHAs, those annoying barely readable, letters and numbers that prove to a website that you’re not a robot or a spammer. Sick of typing those annoying, and barely readable, letters and numbers to prove to a website that you’re not a robot or a spammer? You may be in luck. Google announced Wednesday that the company is trying to get rid of those annoying tasks called CAPTCHAs, which is short for Completely Automated Public Turing test to tell Computers and Humans Apart. Instead of requiring that users fill in the letters and numbers shown in a distorted image, sites that use Google’s reCAPTCHA service will be able to use just one click, answering a simple question: Are you a robot? “reCAPTCHA protects the websites you love from spam and abuse,” wrote Vinay Shet, product manager for Google’s reCAPTCHA service, in a blog post. “For years, we’ve prompted users to confirm they aren’t robots by asking them to read distorted text and type it into a box… But, we figured it would be easier to just directly ask our users whether or not they are robots. So, we did! ” Google on Wednesday began rolling out a new API that rethinks the reCAPTCHA experience. CAPTCHA “can be hard to read and frustrating for people, particularly on mobile devices,” said Zeus Kerravala, an analyst...

Is it Possible to Use Open Standards for the Data Center?

Data Center Security Is it Possible to use Open Standards for the Data Center? As we can see nowadays, there have been a lot of hacking incidents over the world wide web. Data Center is the main storage of all the important files of a particular company. By using Open Standard, what is the data center security it has provided for its users? Are the data totally be secured inside the open standard? Data Center Security plays a very important ingredient that needs to be considered every time. For IT security assistance, Crawley Computer Centre has trained technicians to help you with it. Optimising the datacentre using open standards Summary: Employing open standards is the key to unlocking the full potential of your datacentre infrastructure. The exponential growth of enterprise data and corporate reliance on technology is placing enormous demands on the modern datacentre. Information must be transmitted rapidly, processed in real time, and stored securely. Service uptime and availability guarantees necessary for your business to compete in the global marketplace are increasing. While cloud computing solutions to these problems have steadily matured and adoption is now widespread, business leaders continue to demand greater efficiencies and ROIs from their IT investments. Intel believes that employing open standards is the key to unlocking the full potential of your datacentre infrastructure. When designing scale-out architecture to support constantly expanding and shifting business requirements, open standards play a critical role in maintaining interoperability. Recognising this, a consortium of large companies, including BMW, Lockheed Martin, Shell, and JP Morgan Chase, formed the Open Data Center Alliance (ODCA) in 2010, which now boasts over 300 member organisations. Under technical guidance...

Computer Virus: The worst enemy of a system.

Computer Virus Types of Computer Virus Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus is very similar, it infects your programs and files, alter the way your computer operates or stop it from working altogether. Learn about computer viruses and how to help prevent viruses on your own computer. Virus is the worst enemy of a system that can cause multiple damages to it and sometime may prove fatal for the entire system. If you don’t take care of the issue properly it is quite possible that you have to spend a lot of money to get a new one, which seems impossible sometime. If a system acquire virus, there is huge possibility that you loss all your necessary information as drive or software can often crash due to virus attack. This is a very common issue that you often face; however there are other facts as well that you should know in detail to decide how important it is to make use of anti-virus devices in a system. Video about Computer Virus Damages: Computer virus can do something more than what you think. Every single document that has been stored in the hard drive will lost forever if you don’t free your system of virus. Losing personal information is a nightmare and it can ruin a project or your entire effort in just a few a minute. You can buy a new computer, but it is quite impossible to get back all those...

Facebook Scams; Anyone Can Fall Victim!

Facebook Scams Facebook Malware Looking for information on the Facebook scam virus?  Facebook now has a billion users. Unfortunately some of them are crooks and scammers. So keep an eye out for these popular popular categories of scam baits used by cyber-criminals to trick Facebook users. Anyone could fall victim to Facebook scams, such as the classic “guess who viewed your profile” scam and others, Bitdefender behavior analysts warn. A two-year study by the antivirus software provider reveals that scammers infect millions of Facebook users with the same repackaged tricks. The team of behavior analysts and psychologists analyzed the five scam categories and revealed there is no such thing as a typical victim profile. Still, the psychological analysis revealed a strong correlation between victims and the less informed, especially when it comes to how Facebook works. While almost half of social media e-threats prey on users’ curiosity to check who viewed their profile, almost one in three scams attract victims with features Facebook doesn’t have, such as dislike buttons and different timeline colors. Video about Facebook Scams Bogus giveaways, such as free Disneyland tickets and game points, account for 16.51 per cent of the numerous scams in the last two years, while celebrity sex tapes account for 7.53 per cent. Facebook scams are monetized through fraudulent surveys or Trojans mining for banking and browser passwords. Though still a niche category, atrocity videos are gaining popularity, Bitdefender security researchers warn. “Like and share” schemes using horrendous images, such as maimed animals, suffering children, and tortured women, now account for almost 1 percent of all scams, according to the study. Read...