[Chugalug] Wordpress Sites Under Wide-Scale Brute Force Attack

Stephen Haywood stephen at averagesecurityguy.info
Mon Apr 15 01:19:51 UTC 2013


I just use wordpress.com to host my blog.

Stephen Haywood
Owner, ASG Consulting
CISSP, GSEC, OSCP
T: @averagesecguy
W: averagesecurityguy.info


On Sun, Apr 14, 2013 at 8:50 PM, William Wade <willm.wade at gmail.com> wrote:

> If you want to run Wordpress and be safe(r) I would suggest a
> managed environment like wpengine. But that safety comes at a monthly cost.
>
>
> On Sun, Apr 14, 2013 at 5:29 PM, Mike Harrison <cluon at geeklabs.com> wrote:
>
>> On Sun, 14 Apr 2013, Rod-Lists wrote:
>>
>>> Wordpress is like Windows. Yes more people know about it than any other
>>> CMS.
>>> Yes someone who knows what they are doing can lock it down and make it
>>> secure.
>>> But it is a harder row to hoe with Wordpress.
>>>
>>
>> The problem is, Wordpress users are often the bottom of the clueful
>> spectrum, It's why they are using it. It's part of why lots of things are
>> dangerous.
>>
>> As Linux systems hit more of the "Normal Person" market, you'll see the
>> same issues. Andoid's done it..
>>
>> ______________________________**_________________
>> Chugalug mailing list
>> Chugalug at chugalug.org
>> http://chugalug.org/cgi-bin/**mailman/listinfo/chugalug<http://chugalug.org/cgi-bin/mailman/listinfo/chugalug>
>>
>
>
> _______________________________________________
> Chugalug mailing list
> Chugalug at chugalug.org
> http://chugalug.org/cgi-bin/mailman/listinfo/chugalug
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://chugalug.org/pipermail/chugalug/attachments/20130414/3b49951b/attachment.html>


More information about the Chugalug mailing list