As May just passed we have received the report for our data center uptime: 99.96% Read more
In may 2016 there are a few changes on Brute Force attacks against our datacenter. Read more
As we already wrote, one of the attack target on any WordPress web hosting data center it is the Brute Force Attack, when the intruder try to check even 1000 password per minute in order to hack a web site.
As our policy it is not only to stop, but also to ban completely the IPs where from come the attacks, we reduce the risks that your website hosted in Custom Cloud Servers to be hacked. Read more
On 6th of may our mailbox received a very nice email apparently from a Gmail account with an invoice zip file. The single text found it was ‘Sent from my Samsung device’
But as we are searching for new viruses we just stopped on the sender IP (187.141.53.xxx) which doesn’t belong to Gmail servers.
Anyway who is looking at email sources after all.
To view the video please just switch in full screen.
We already explained the Brute Force Attack in a previous article http://customcloudservers.xyz/wordpress-brute-force-attack/
Our Data Center it is also the target of such attacks, as it is normal. We counter only new attacks each day as the old one are already banned, so we are not interested on that ones.
Series1 represent the total number of new attacks in our data center. (click the pic to enlarge it) Read more
If you think that you will find here how to create a ransomware it is better to search another source than us.
For the users protection we didn’t show even the whole source of the Office Macro. Moreover after we decrypted the password of the macro (in order to view it) we unprotected the macro in order to not know the numbers of the characters of the original virus macro.
Now let’s start to view first the 4 minutes video made by us. Please DO NOT TRY ON YOUR PERSONAL computer to ‘play’ with viruses because it exist a very big possibility to get your computer harmed by the virus. Read more
Today we present you another way for hackers to hijack your data.
Using a malware from an email or from an infected webpage, the intruders simply modify your hosts file (from /windows/system32/drivers/etc)
By making some changes here the intruder will have a few choices on what to do next. Now all depends on what did he need.
The most common intrusion on the hosts file it is combined with another changes made in your registry and your browsers. But simply modifying this small file could divert your request to another web sites.
Unlike other method of hacking which means more elaborate methods, when we think about WordPress web sites our minds of security stuff go directly to Brute Force Attacks.
From the early years of WP there it is a wp-login.php file on the root directory and a folder /wp-admin.
Also there are thousand of user which are using as administrator user name ‘admin’ with very simple passwords like admin123 or other simple to guess passwords. Read more
First of all please do not try in any way this on your computer!
One of the best methods to keep far from your computer any malware and viruses it is to use an anti virus program.
There are a few very good, some of them free or free to test.
Some of the best include (alphabetical order) Avira, ESSET or Malwarebytes
But you have to pay a lot of attention on the updates. Read more
Click on images for zoom in!
As you will see, the virus is very fast, encrypting your data in seconds.
How did it arrive at your computer?