|20 Apr 2013||#1|
| || |
WordPress attack highlights 30 million targets
It'd be easy to dismiss the recent reports of a botnet attack on sites running the WordPress content management system (CMS) as yet another cry-wolf scare story from an exaggeration-prone web hosting company eager for business. After all, one of the earliest posts about the attack was from CloudFlare, and they've got form.
Less than a month ago, CloudFlare chief executive officer Matthew Prince spun the distributed denial of service (DDoS) attack against Spamhaus into "The DDoS that almost broke the internet", and he shamelessly told The New York Times that "These things are essentially like nuclear bombs ... It's so easy to cause so much damage."
|My System Specs|
|Similar help and support threads for2: WordPress attack highlights 30 million targets|
|DDoS Attack, Changed IPs Still Under Attack||System Security|
|Huge attack on WordPress sites could spawn never-before-seen super bot||Security News|
|Phishing Attack Targets Merchant Accounts||Security News|
|Superbar Highlights Sticking||General Discussion|
|Wordpress injection attack and “affiliate ping-pong.”||Chillout Room|
|Turning of Task Bar Highlights||Customization|
|The million dollar question that has been asked a million times||Chillout Room|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 11:36 AM.