Posts By Bhagyeshwari Chauhan

Top 7 Most Common Prestashop Attacks

Prestashop Security Issues In the ever-thriving business of online retail, Prestashop is a competitive contender in the global retail e-commerce Software Market. While this industry has been largely dominated by big players like Magento, Opencart, and Shopify. Prestashop is rising up the ranks and is being accepted as a reliable alternative for setting up online retail businesses. An immensely feature-rich, free, open-source…

How Spam Links Can Affect your Site's SEO and Adwords

When it comes to optimizing your site for SEO, link building is one of the most important measures to gain good standing in Google searches. While you may strive to make your website SEO friendly, the presence of spam links will largely hamper your site's visibility and disrupt its SEO ranking. What are Spam Links? Bad links refer to links obtained…

In its quest to provide a safe online experience to its users, Google often identifies and flags fraudulent seeming domain and blacklists websites it discovers as potentially malicious. When a domain is blacklisted by Google, it deters users from visiting it, informs the site owner and stops malicious activities at its roots. Domain gets blacklisted when search engines like Google, Bing, Norton…

How to remove the Backdoor: PHP/apiword malware from your WordPress website

Lately, Wordpress witnessed a perilous situation when it discovered a malicious code added to the top of the functions.php file, exploiting which the malware creator can unleash pretty much any damage he'd like. The injected code comes from the apiword malware which not only creates modifications in post.php and functions.php, but also creates a file containing a backdoor: /wp-includes/class.wp.php The presence of the functions.php file is…

Drupal Malware: How to Fix Drupal Kitty Cryptomining Malware

Drupal, deemed as one of the most secure CMS around the world has been in news lately for notorious reasons. A malware going by the named "Kitty" has infected Drupal sites making it highly susceptible to mining crypto mining attacks. The malicious script exploits the very well known critical remote-code execution vulnerability in Drupal “Drupalgeddon 2.0”, The Kitty Drupal Malware infects vulnerable…

Magento security

How to Prevent Magento Malware Injection? Magento, while being one of the most favored e-commerce platforms, has also witnessed a steep rise in malware attacks. E-commerce platforms are a goldmine for malicious actors to harvest lucrative credit card and personal information from online transactions. While Magento owes to its popularity to strict security practices, a timely update of system core and immediate…

Critical Drupal Vulnerability: Massive localstorage[.]tk Drupal Infection

The spring of 2018 has witnessed a surprising rise in the number of infections stemming from Drupal vulnerability. Once deemed as one of the most secure CMS among its counterparts: Wordpress and Joomla, and catering to a number of businesses worldwide, Drupal has recently been subject to yet another malicious attack. Drupal users are currently tackling a massive surge in infections…

How to prevent SQL Injection (SQLi) in Opencart 1.5.x/2.x/3.x

Opencart, one of the most prominent Open Source Shopping Cart Solution is eye candy to hackers and online attackers. Opencart uses MySQL for its databases, and incorrect interaction with the database results in various vulnerabilities. One of them is SQL injection (SQLi). Opencart has been on the radar of hackers and many cases of SQLi in OpenCart have been found in the past…

Opencart has been the most sought-after platform as a store management system for e-commerce merchants. Owing to its simplified design, interactive UI and ease of use, Opencart is largely favored for retail activities online. However, in light of its popularity, Opencart has notoriously garnered a reputation for being an eye candy for hackers and other attackers with malicious intent. As…

All You Need to Know About Android App Vulnerability: Insecure Communication

The Open Web Application Security Project (OWASP) has listed Insecure Communication as the third most exploited risk in mobile applications. As the name suggests, Insecure Communication refers to mobile app vulnerability where sensitive data is intercepted while it's traveling across the wire. This type of mobile app vulnerability is most common since the majority of applications exchange data in a client-server fashion.  When the data is transmitted, it…

Free Website Security Scanner

Close