Hacker Newsnew | past | comments | ask | show | jobs | submit | davedd's commentslogin

Glad you liked :)


That's a good approach, but not novel and not the first host doing that.

Many hosts automatically scan and fix their clients sites and have been doing that for a while. Specially when you are talking about popular CMSs like WorPress, Joomla and drupal.

thanks,


I'm sorry, I think due to our lacking description of how the technology exactly works you're confusing it with existing technologies. What we announced today is not comparable with something like Installatron, they do just version updates. Those automatic updates usually breaks plugins. We only patch the vulnerabilities, without modifying any functionality.


Nope, we work with hosts that do exactly that. Patch and update if it is outdated, fix if it is broken and even remove any malware if it is infected.

Again, what you guys are doing is great, and I don't want to take that way. My only point is that you were not the first and some have been doing that for a while.

thanks,


>>> I'm sorry, I think due to our lacking description of how the technology exactly works you're confusing it with existing technologies.

Well, please, then already describe how it works. And don't forget technical details as we're quite technical 'round here..


Sorry, but you definitely aren't the first: http://support.wpengine.com/wp-engines-security-environment/


To my understanding, the page you are linking to describes a sandbox environment, which is different from what the poster is doing.


I don't know if this is the same thing, but I know Dreamhost auto-updates my abandoned Wordpress sites (is that triggered through Wordpress itself, even on independent WP installations?)


Another issue we identified is that you can find those "hidden" admin panel or URLs that shouldn't be known to the outside, by just refreshing the page a few times and checking all requests.

It is not a best practice, but some companies do and it makes easier for those to be found.

thanks,


Site is back up.


Valid link: https://gudado.com/tools/freeemail.php

It also has a simple/open API that anyone can use (being using that on our own sites).

thanks,


Remote, Anywhere, anywhere

PHP Developer: http://sucuri.net/company/employment

" Sucuri is looking for a Senior PHP Developer with JavaScript & AJAX chops to join our team, and help us continue building the most polished and reliable website malware scanning and cleanup engine in the world.

This developer would be responsible for creating new enhancements as well as improving existing functionality within a high-load, high-availability, distributed environment. "

Details: http://sucuri.net/company/employment


A quick tool for end users to check if their emails were compromised:

http://labs.sucuri.net/?yahooleak


We did an analysis of the dump:

http://blog.sucuri.net/2012/07/analysis-of-yahoo-voice-passw...

Interesting is the lack of "yahoo" as part of the passwords... I would expect a much higher % from a yahoo leak.


+1 for ninja being 4th most used password


Remote.

This position is remote and affords a semi-flexible working schedule.

Job Position: Senior Security Support “Ninja” Analyst

Description: As a Senior Analyst you will be responsible for:

-Handling our most complex security cases (hacked servers, broken sites, hidden malware, etc)

-Troubleshooting broken websites (WordPress, Joomla, osCommerce, Magento, vBulletin, Drupal, and more)

-Direct engagement with the research team to expand our engine

-Queue wrangler, engaging with Junior staff and streamlining processes

As you might imagine, its not all unicorns and rainbows we’re looking for a technical type and specifically someone with the following traits:

-Advanced Linux experience – CLI

-Server hardening and security experience (using firewalls, NIDs, HIDs, etc)

-Experience with log analysis, malware analysis or forensics a big plus

-System administration experience with WordPress, Joomla, ,etc osCommerce or other CMSs

-Shell scripting required

-PHP and C coding experience useful, but not required. -Open source and community participation and contributions a plus

*We love to see active community engagement. If you’re already assisting on forums (WordPress.org, open source project, github, stackoverflow, stopbadware) please include your account name as a reference

Link: http://sucuri.net/company/employment


In terms of countries (based on the IP address of the spammer):

#1 USA (30%)

#2 China (20%)

#3 Russia (6%)

#4 Brazil (4%)


IP addresses aren't reliable, especially when considering spammers will know IP address geolocation will be used. It may be safe to assume a vast majority of US IP addresses will actually be proxies.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: