21st Century Learning and Teaching
586.1K views | +0 today
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Joomla'. Clear
Scooped by Gust MEES
Scoop.it!

Joomla Patches Zero Day Targeting EMEA Banks

Joomla Patches Zero Day Targeting EMEA Banks | 21st Century Learning and Teaching | Scoop.it
Content management system Joomla patched a zero-day vulnerability that allowed attackers to upload malicious code that led victims to the Blackhole exploit kit.

 

A nasty Joomla vulnerability was recently patched, but not before attackers used a zero day exploit to take over tens of thousands of sites and redirect victims to the Blackhole exploit kit, according to security company Versafe.

 

Most of the attacks were against financial institutions in Europe, the Middle East and Asia and stemmed from an initial attack against 100 Joomla-hosted websites.

Gust MEES's insight:

 

Joomla vulnerabilities have been a particular problem; 57 percent of the attacks Versafe has seen this year have come from sites hosted on the platform, up from 41 percent last year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Joomla

 

Gust MEES's curator insight, August 14, 2013 5:22 PM

 

Joomla vulnerabilities have been a particular problem; 57 percent of the attacks Versafe has seen this year have come from sites hosted on the platform, up from 41 percent last year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Joomla

 

Scooped by Gust MEES
Scoop.it!

Attackers embedding backdoors into image files

Attackers embedding backdoors into image files | 21st Century Learning and Teaching | Scoop.it
Sucuri researchers find hackers are using a known, but unusual, way to maintain access to an already compromised server by hiding backdoors inside the headers of legitimate image files
Gust MEES's insight:

 

Watch log files for command instances, such as file creation and modification. However, the key point is to stay on top of updates, especially for platforms such as WordPress and Joomla, which are popular targets for attackers and constantly updated in order to address security concerns.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Gust MEES's curator insight, July 18, 2013 5:37 PM

 

Watch log files for command instances, such as file creation and modification. However, the key point is to stay on top of updates, especially for platforms such as WordPress and Joomla, which are popular targets for attackers and constantly updated in order to address security concerns.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Rescooped by Gust MEES from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

WordPress blogs and more under global attack - check your passwords now!

WordPress blogs and more under global attack - check your passwords now! | 21st Century Learning and Teaching | Scoop.it
If you have a web service that supports remote users, you will know that malevolent login attempts are an everyday occurrence.

But hosting providers worldwide are reporting an onslaught at well ...
Gust MEES's insight:

 

Gust MEES's insight:

Check also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Passwords

 

http://www.scoop.it/t/securite-pc-et-internet?tag=DATA-BREACHES

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing

 

Scooped by Gust MEES
Scoop.it!

Correctif de vulnérabilité pour Joomla 1.5 - Versions 1.5.x - Joomla!fr Le portail des Utilisateurs Francophone de Joomla

Correctif de vulnérabilité pour Joomla 1.5 - Versions 1.5.x - Joomla!fr Le portail des Utilisateurs Francophone de Joomla | 21st Century Learning and Teaching | Scoop.it
Joomla! - le portail dynamique et système de gestion de contenu, Association Francophone des Utilisateurs de Joomla!

 

Correctif de vulnérabilité pour Joomla 1.5

Un problème de sécurité a été détecté dans toutes les versions de Joomla, lié aux téléchargements de fichiers non autorisés. Les versions 2.5 et 3.1 sont corrigées lors de la mise à jour en 2.5.14 ou 3.1.5.

Gust MEES's insight:

 

UPDATE asap!!!

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

No comment yet.
Rescooped by Gust MEES from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

WordPress - Brute Force Attacks and Their Consequences

WordPress - Brute Force Attacks and Their Consequences | 21st Century Learning and Teaching | Scoop.it
There is a lot of interesting discussion going on at the moment across the interwebs on the intention of the latest string of Brute Force attacks, much of which

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security

 

Gust MEES's insight:

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security

 

A MUST read to understand the WHY and HOW!!!

 
Gust MEES's curator insight, April 13, 2013 9:51 AM

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security


A MUST read to understand the WHY and HOW!!!