Hackers Exploit WordPress Security Flaws to Carry out Cyber-attacks


News provided by Pressat Wire on Wednesday 12th Mar 2014



It’s been reported that over a hundred thousand Wordpress websites have been hijacked by hackers in a plot that has connected users to a criminal botnet, forcing them to inadvertently launch DDoS attacks. Commenting on this, Lancope CTO, Tim 'TK' Keanini, said:

"Think of it as a supply chain and these criminals need compromised connected computers for their botnets. If you are connected for what ever reason to the Internet, you are a part of this supply chain.
This is not something that will ever go away – this is the way it is going to be from here on out. These cybercriminals continue to innovate and find vulnerabilities to exploit for their criminal activity. To add to this, we continue to put insecure devices on the Internet and with the Internet of Things ramping up, there is just no end to the supply of targets.

What we need to do is to focus on the precision, timeliness, and leadership through these crisis - not the fact that they will just go away. They are here to stay and a part of doing business in the Internet age. When these events happen, what does leadership look like that provides business continuity and restores customer confidence? That is the question we need to be asking because hanging your head in shame does no one any good."

-ENDS-

For more information, please contact:

Lara Lackie
Eskenzi PR
E: lara@eskenzipr.com
T: 0207 183 2834

Press release distributed by Pressat on behalf of Pressat Wire, on Wednesday 12 March, 2014. For more information subscribe and follow https://pressat.co.uk/


Wordpress Wordpress Exploit Wordpress Hack DDOS DOS Denial Of Service Computing & Telecoms
Published By

Pressat Wire

Pressat Wire
editorial[@]pressat.co.uk

Visit Newsroom

Media

No media attached. Please contact Pressat Wire for more information.


Additional PR Formats


You just read:

Hackers Exploit WordPress Security Flaws to Carry out Cyber-attacks

News from this source: