Call us +1-231-421-7160

How sites get hacked and how to prevent it?

get-hacked.jpg

Introduction

Every day thousands of websites get hacked and about one-third of those sites are based on popular CMS (Content Management System) applications like WordPress, Joomla!, Drupal or Magento. The most popular CMS is, of course, WordPress, which is used on over 60% of all CMS based websites. Since CloudAccess.net specializes in the hosting of CMS applications (Joomla! and WordPress) we are dealing with hacked sites on daily basis.

Read more
  547 Hits

Protection from Critical WordPress XSS Vulnerability

wp

Earlier today a zero-day XSS vulnerability was discovered, and it appears to affect all versions of WordPress. This vulnerability resulted in a critical security update release and it is recommended to update your WordPress site immediately.

The CloudAccess.net Abuse Team learned of the vulnerability shortly after its release. Within 2 hours, our team had crafted security measures at the server level in an effort to thwart this particular attack vector. The action taken by our team will likely result in less infected sites on the CloudAccess.net network and ultimately less affected clients.

The CloudAccess.net Platform is built specifically for hosting WordPress and Joomla websites. The well-being of these sites is our top priority and we take these types of vulnerabilities very seriously. As the Joomla and WordPress communities continue to harden the applications, CloudAccess.net will continue to evaluate each application's security at the server level.

  13711 Hits

Understanding the IPv6 Rollout

ipv6-ready

Internet Protocol is the set of rules that governs the exchange of information and the way traffic is routed on the web. Internet Protocol Version 6 (IPv6) is the next generation Internet communication protocol that provides an identification and location system for devices, computers and networks and will replace IPv4, the current protocol that has many limitations. This blog shines some light on IPv6 and explains the impact on Internet users and how the CloudAccess.net platform is IPv6 ready.

The Growth of the Internet and the Need for a New Protocol

Originally developed in the 1970s, IPv4 is a cornerstone of the Internet as we know it. It was developed long before anyone could really imagine all of the interconnected devices that we have today. IPv4 allows for approximately 4.3 billion unique IP addresses, which might sound like a lot and certainly was a lot in 1970s standards. Nobody in 1970, however, could have predicted that the Internet would be as popular as it is or that many of us would be walking around with high speed computers in our pockets. With close to 3 billion current Internet users, IPv4 presents some serious limitations.

Essentially, the biggest limitation is that IPv4 is running out of the 32 bit addresses that each computer or device is required to have. An example of a 32 bit IPv4 address:

Read more
  3335 Hits