Frequently Asked Questions

Security Articles

Joomla! Module Security Compromise: mod_Administrator

We've detected a compromise affecting Joomla!® installations. In this compromise,...

Checking Joomla! Databases for Malicious Users

Attackers often create users to exploit security vulnerabilities in Joomla! and other...

About Application Security Compromises

There are a few common ways that your website, or Web application, can be hacked, or...

Fixing Your Drupal Site (Drupalgeddon)

tr:nth-child(odd) {background-color: #f7f7f7;} th{background-color:#ddd;...

Malicious WordPress Plugins

Plugins let you add and customize WordPress' features. WordPress keeps a repository of...

Identifying Malicious Redirects on Your Website

If attackers compromise your site, they might insert malicious code that redirects...

Resolving Google Safe Browsing Issues

If the following image displays when you visit your website, it's been blacklisted by...

What is an FTP compromise?

To move files between your computer and your website, you use File Transfer Protocol...

WordPress Compromise: Spam Content

We've detected a compromise affecting some WordPress sites. In this compromise,...

WordPress Compromise: TimThumb

TimThumb is a tool used by WordPress themes and plugins to resize images. Old versions...