Tag Archives: Attacks

WordPress – Discourage Brute Force

A common technique used by hackers to gain unauthorized access to websites is called ‘Brute Force’. Using this technique, hackers use software designed to scan a website for vulnerabilities and …

Tags: , , , , , , , , | Posted under WordPress | 1 Comment

Protect Joomla from Attacks

Joomla is one of the most secure open source software available. You can build secure websites within minutes with it. However, we always recommend to add extra layers of security, …

Tags: , , , , , , , , , , , , , , , , , , | Posted under Joomla | Leave a comment

Silverlight: Avoiding Cross-Site Scripting Attacks

Cross-site scripting (XSS) describes a vulnerability typically found in Web applications. If steps are not taken to prevent this type of vulnerability, an attacker can inject code (typically JavaScript) into …

Tags: , , , , , , | Posted under 3rd Party Software, Programming/Coding | Leave a comment