Spam-Content/EN/Background: Unterschied zwischen den Versionen

Aus Siwecos
Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „The login data for the website may have been compromised by a malware infection on the computer, or by criminals hacking the website from the outside. Unnotice…“)
 
 
Zeile 1: Zeile 1:
The login data for the website may have been compromised by a malware infection on the computer, or by criminals hacking the website from the outside. Unnoticed by the owners of the website, malicious code for spam content is deposited on the [[Server|Host/Webspace]]. It is also possible that attackers gained access via the administrator login of the [[Content-Management-Systeme|CMS]], or that they may have exploited security flaws in outdated [[Plugin|Plugins]] in order to upload [[Malware|Schadcode]]. Through the use of these files, spam content is injected into the WordPress theme or into the database, thus creating concealed links to malicious websites.
+
The login data for the website may have been compromised by a malware infection on the computer, or by criminals hacking the website from the outside. Unnoticed by the owners of the website, malicious code for spam content is deposited on the host/web space. It is also possible that attackers gained access via the administrator login of the [https://en.wikipedia.org/wiki/Content_management_system content management system (CMS)], or that they may have exploited security flaws in outdated plug-ins in order to upload malware. Through the use of these files, spam content is injected into the WordPress theme or into the database, thus creating concealed links to malicious websites.

Aktuelle Version vom 6. Februar 2019, 15:54 Uhr

The login data for the website may have been compromised by a malware infection on the computer, or by criminals hacking the website from the outside. Unnoticed by the owners of the website, malicious code for spam content is deposited on the host/web space. It is also possible that attackers gained access via the administrator login of the content management system (CMS), or that they may have exploited security flaws in outdated plug-ins in order to upload malware. Through the use of these files, spam content is injected into the WordPress theme or into the database, thus creating concealed links to malicious websites.