Network Solutions' security team is battling a mysterious attack that has silently infected a "huge" number of the websites it hosts with malicious code. The mass compromise affects sites running WordPress, Joomla, and plain-vanilla HTML, according to reports here and here from Securi Security and Stop Malvertising. Many of the …
Overpriced and lousy security
Since ICANN, there's been no reason to use NSI as a registrar; and they've always been a poor choice for web hosting. Security breaches seem to be routine over there; and they confess that they still don't know how 600,000 names/addresses/CC# were stolen from their "secure" servers last summer.
My websites bring me in a healthy chunk of cash. I know what I would be doing if I was a network solutions client and it doesn't involve buying them an xmas card..
Why would people continue to do business with this company after so many breaches do people simply not care about their privacy anymore?
The servers are
only as secure as the code that's on there. If you're running old code, expect your site to get done over from all the exploits that you're allowing. Most people simply upload Wordpress or Joomla or something, and think that's all they need to do. They don't bother securing it, they never bother updating it, and they use untrusted unofficial third party modules that have exploits in them.
Then they come crying to anyone and everyone when their site gets compromised, instead of taking the responsibility themselves for not knowing what they're doing.
It doesn't matter how idiot proof you make scripts or servers, there's always a bigger idiot out there.
- Review Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
- +Comment 'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
- Nokia: Read our Maps, Samsung – we're HERE for the Gear
- Ofcom will not probe lesbian lizard snog in new Dr Who series
- Rejoice, Windows fans: Stable 64-bit Chromium drops for Win 7 and 8