What happens when an enterprising young person is in front of a computer too long?
Oh yes one thing leads to another and WordPress is something to conquer.
It does require patience and diligence. Every day somebody is finding new vulnerabilities in new and old software (this problem was uncovered by ‘speckz’ poster on reddit).
So in the image above (which are snippets of the website¹ that speckz placed). I did not place the details of his analysis because I do not want to get in the weeds (php code etc).
That is what a criminal and good hacker does. Diligently pursue code snippets until they reveal more information about the website technology.
The idea is for you to have someone that will keep an eye on your security, preform vulnerability analysis and more.
Either way you will pay some money to someone… Either to ethical hackers or as in the next point from unethical extortionist hackers.
Threatpost² has a story which tells of 30 unsolicited bug poaching incidents. Here is where the ‘bug poachers’ are telling companies: “You have a bug in xyz software or system” on your premise. Oh and by the way we already stole all your data.
So what you need to do is give us(the poachers) $10,000 so we will tell you where the problem is and we will not use the data we stole for nefarious deeds.
So do you believe these unethical criminal elements?
Paying Extortion is bad because guess what – it will happen again.
What you really need is to spend more money and resources on fixing all IT process problems that are causing this problem in the first place. How can I say this with certainty?
Here is a quote from the Threatpost post:
- https://notehub.org/5zo2v
- https://threatpost.com/hackers-find-bugs-extort-ransom-and-call-it-a-public-service/118360/
Contact Us to discuss