Sucuri researchers find hackers are using a known, but unusual, way to maintain access to an already compromised server by hiding backdoors inside the headers of legitimate image files
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
Your new post is loading...
Your new post is loading...
|
Watch log files for command instances, such as file creation and modification. However, the key point is to stay on top of updates, especially for platforms such as WordPress and Joomla, which are popular targets for attackers and constantly updated in order to address security concerns.
Learn more:
- http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/