Category: Malware


Online security checker

We found a really useful tool that checks the security of your system. It’s an online tool that doesn’t need any installation. Run the tool and the system will tell you what vulnerabilities your system is open to. It’s then just a matter of closing… Continue reading

Display email delivery count for domains

We recently cleaned a WordPress site from malware for a Client after their server ended up on a blacklist due to the amount of spam it was sending out. This effects email delivery to end users as mail is usually rejected. Here’s a really useful… Continue reading

Talk Talk update

Talk Talk update¬†for our Customers. This is the third serious attack against the broadband, TV and phone provider in 2015. It seems that however they tighten their defences the hackers keep finding ways in. The investigation is still ongoing, but unfortunately there is a chance… Continue reading

WordPress Malware removal

We’ve recently detected and removed a trojan from a Client’s website after being contacted early one morning. WordPress malware removal – The infection was a simple piece of malware that replaced the .htaccess file when ever it was changed. The interesting thing was that the… Continue reading

New fully managed hosting client – Striker Productions

Fully managed hosting client Striker Productions

We’d like to welcome Striker Productions to our family of fully managed hosting Clients. We rebuilt the website on our testing server, ridding it of the malware that was causing issues, before promoting it over to our production servers.

Some of the DNS attacks in force today

DNS attacks – A simple way to gauge the extent of the danger posed by DNS vulnerability is to look at the sheer number of attack types currently being launched. This is not all of them and new ones are emerging. Direct DNS amplication attacks… Continue reading

Ghost vunerability – Ubuntu and CentOS

Ghost vunerability

A new vulnerability, GHOST: glibc vulnerability (CVE-2015-0235), has been discovered that affects certain Linux systems. This exploit affects the gethostbyname functions in the GNU C Library (glibc), which is a key component of all Linux systems. Because many software programs rely on these functions, Linux… Continue reading

WordPress hacked site cleanup service

WordPress site cleanup service

WordPress hacked? When a WordPress site get’s hacked finding the malware can be tricky, however once you understand the principles behind SQL Injections, brute force attacks and suspicious file types, tracking down the infection isn’t too difficult. If the infection has spread to your server… Continue reading