Joomla Development Insights

Joomla Development Insights

Thoughts on development and Joomla from John Hooley, senior Blue Bridge developer.

19 Simple Steps to Protect Joomla From Hackers

19 Simple Steps to Protect Joomla From Hackers

"Castle" by Raúl A. Used under Creative Commons

The security environment of the Internet seems to get riskier and riskier every year. Hackers and security professionals are locked in ever escalating battles and websites are subject to continual probing for vulnerabilities.

Wondering how to protect your Joomla website against hackers can keep you awake at night— and for good reason because dealing with a hacked Joomla site is a sure way to ruin your week (and sometimes month.)

But figuring out how to secure Joomla can be daunting and it's easy to dream up a silly story like, "My site is not that important, no hacker will target me," and then try to ignore your anxiety whenever you think about it.

Instead of laying awake at night, what if instead you could sleep like a baby because you knew you had methodically protected your Joomla site against hacking? Instead of ignoring that pit in your stomach, what if you were serenely confident in your website's security because you knew and had implemented Joomla security best practices?

Peace of mind is a wonderful thing and this Joomla security checklist will provide you with exactly that. We will go step-by-step down the list of best practices in order to remove vulnerabilities, secure your defenses, and make your Joomla site an extremely tough nut to crack.

Continue reading
0 Comments

How Hackers Hijack a Joomla Website's Google Results

How Hackers Hijack a Joomla Website's Google Results

One of the first symptoms that some Joomla website owners see that indicate they've been hacked is when they Google their own site and instead of seeing information in the search results about their product or service, they instead see Japanese characters, advertising for shady products (casinos, payday lenders, imitation fashion goods, pharmaceuticals) or links to pages that shouldn't exist and contain information about another domain's spam offering.  Occasionally, the search results even look legitimate and reflect the actual website, but when visitors browse through they're redirected to a dark corner of the Internet.

Continue reading
0 Comments

Fake Social Links Silently Deliver Malware to Joomla Users

Fake Social Links Silently Deliver Malware to Joomla Users

Malware Bytes researchers have identified a new pattern in attacks on Joomla sites. Compromised sites have a link injected in them that appears to load social sharing buttons, but actually delivers malware to users' computers using the Angler exploit kit. In this blog post, we'll look at how the attack works, what makes it unique, and how to check whether your site is affected.

Continue reading
0 Comments
Powered by EasyBlog for Joomla!
Powered by EasyBlog for Joomla!