<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/tag/wordpress/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Sat, 22 Jun 2013 21:40:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>Widespread Attack on WordPress Websites</title>
		<link>https://www.interxect.com/widespread-attack-on-wordpress-websites/</link>
					<comments>https://www.interxect.com/widespread-attack-on-wordpress-websites/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 13 Apr 2013 13:12:32 +0000</pubDate>
				<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wordpress]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=686</guid>

					<description><![CDATA[Over the past 3-4 days there have been a widespread, distributed attack on Wordpress sites.]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignleft size-post-image wp-image-687" alt="Wordpress Login" src="https://www.interxect.com/main/wp-content/uploads/2013/04/wordpress_login_admin-250x200.png" width="250" height="200" />Over the past 3-4 days there has been a widespread, distributed attack on WordPress sites according to this article by <a title="Hackers Point Large Botnet At WordPress Sites To Steal Admin Passwords And Gain Server Access" href="http://techcrunch.com/2013/04/12/hackers-point-large-botnet-at-wordpress-sites-to-steal-admin-passwords-and-gain-server-access/" target="_blank">TechCrunch</a>.</p>
<p>The attacks use bots to attempt a brute force attack on WordPress installations using the default &#8220;admin&#8221; username and a dictionary of passwords.</p>
<p>Many websites, including ours, run on WordPress. It is recommended that you use a different administrative username and a strong password. Even if you are using a different administrative username, you should still use a strong password. See our article &#8211; <a title="5 Tips To Help You To Secure and Manage Your Passwords" href="https://www.interxect.com/main/2012/06/5-tips-to-help-you-to-secure-and-manage-your-passwords/" target="_blank">5 Tips To Help You To Secure and Manage Your Passwords</a> &#8211; on tips for strong password creation.</p>
<p>The attacks have died down over time, and many ISPs have put in measures to secure their users. Our ISP put out this <a title="Widespread Attack on WordPress Installations" href="http://www.site5.com/blog/s5/widespread-attack-against-wordpress-installations/20130412/" target="_blank">notice</a> yesterday. But this is no reason to relax. Security is about eternal vigilance, and you can bet that the next wave is coming.</p>
<p>Original article: <a href="https://www.interxect.com/widespread-attack-on-wordpress-websites/" rel="bookmark" title="Permanent link to 'Widespread Attack on WordPress Websites'">Widespread Attack on WordPress Websites</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/widespread-attack-on-wordpress-websites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">686</post-id>	</item>
		<item>
		<title>MySQL Vulnerability Allows Attackers to Bypass Password Verification</title>
		<link>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/</link>
					<comments>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 16 Jun 2012 03:51:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Drupal]]></category>
		<category><![CDATA[Joomla]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wordpress]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=299</guid>

					<description><![CDATA[Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql.png"><img decoding="async" class="alignleft size-medium wp-image-361" title="mysql" src="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql-300x155.png" alt="" width="300" height="155" srcset="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql-300x155.png 300w, https://www.interxect.com/main/wp-content/uploads/2012/06/mysql.png 489w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Security researchers have released details about a <a title="MySQL vulnerability allows attackers to bypass password verification" href="http://www.computerworld.com/s/article/9227965/MySQL_vulnerability_allows_attackers_to_bypass_password_verification" target="_blank">vulnerability in the MySQL server</a> that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.</p>
<p>The vulnerability occurs only on *NIX based systems and Microsoft Windows systems are not affected by this vulnerability.</p>
<p><span id="more-299"></span>No official patch is available for MySQL 5.0.x, because that version of thedatabase server is no longer supported by Oracle. However, some Linux vendors might backport the patch from MySQL 5.1 or 5.5. This also affects people with personal blogs on private Linux hosts that use MySQL back-ends for web applications such as WordPress, Joomla and Drupal.</p>
<p>Any Internet accessible MySQL database is extremely vulnerable, and those in <a title="Expect A Surge In Breaches Following MySQL Vulnerability" href="http://www.darkreading.com/database-security/167901020/security/vulnerabilities/240001958/expect-a-surge-in-breaches-following-mysql-vulnerability.html" target="_blank">security circles are warning of a wave of attacks</a>. To reduce the risk, configure your MySQL databases to accept connections from only authorised IP addresses and try not to allow any public IPs access to the databases.</p>
<p>Original article: <a href="https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/" rel="bookmark" title="Permanent link to 'MySQL Vulnerability Allows Attackers to Bypass Password Verification'">MySQL Vulnerability Allows Attackers to Bypass Password Verification</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">299</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching 2/47 queries in 0.015 seconds using Disk

Served from: www.interxect.com @ 2025-05-29 17:50:22 by W3 Total Cache
-->