<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>General Archives - CVTF Studios.net</title>
	<atom:link href="https://cvtfstudios.net/category/general/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfstudios.net/category/general/</link>
	<description>Webhosting in the city</description>
	<lastBuildDate>Thu, 12 Feb 2026 11:26:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>2026 Computing Essentials &#8211; Professional Infographic Guide</title>
		<link>https://cvtfstudios.net/2026-computing-essentials-professional-infographic-guide/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 22:01:26 +0000</pubDate>
				<category><![CDATA[FAQ]]></category>
		<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://cvtfstudios.net/?p=71123</guid>

					<description><![CDATA[<p>2026 Computing Essentials – Professional Knowledge FAQ's  </p>
<p>The post <a href="https://cvtfstudios.net/2026-computing-essentials-professional-infographic-guide/">2026 Computing Essentials &#8211; Professional Infographic Guide</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: center;"><strong>2026 Computing Essentials – Professional Knowledge FAQ&#8217;s</strong></h1>
<p style="text-align: center;"><img fetchpriority="high" decoding="async" class="aligncenter size-large wp-image-71127" src="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-1024x683.jpg" alt="" width="1024" height="683" srcset="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-200x133.jpg 200w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-300x200.jpg 300w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-400x267.jpg 400w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-500x333.jpg 500w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-600x400.jpg 600w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-700x467.jpg 700w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-800x533.jpg 800w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-1024x683.jpg 1024w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios-1200x800.jpg 1200w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQs-for-cvtf-studios.jpg 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<div class="container">
<div class="faq-grid"><img decoding="async" class="wp-image-71131 alignleft" src="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-purple.jpg" alt="" width="362" height="358" srcset="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-purple-66x66.jpg 66w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-purple-200x198.jpg 200w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-purple-300x296.jpg 300w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-purple-400x395.jpg 400w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-purple-500x494.jpg 500w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-purple-600x593.jpg 600w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-purple.jpg 683w" sizes="(max-width: 362px) 100vw, 362px" /> <img decoding="async" class="wp-image-71132 alignleft" src="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-pink.jpg" alt="" width="366" height="359" srcset="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-pink-66x66.jpg 66w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-pink-200x196.jpg 200w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-pink-300x294.jpg 300w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-pink-400x392.jpg 400w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-pink-500x490.jpg 500w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-pink-600x588.jpg 600w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-pink.jpg 689w" sizes="(max-width: 366px) 100vw, 366px" /> <img decoding="async" class="wp-image-71133 alignleft" src="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-blue.jpg" alt="" width="387" height="360" srcset="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-blue-200x186.jpg 200w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-blue-300x279.jpg 300w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-blue-400x372.jpg 400w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-blue-500x465.jpg 500w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-blue-600x559.jpg 600w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-blue.jpg 680w" sizes="(max-width: 387px) 100vw, 387px" /> <img decoding="async" class="wp-image-71134 alignleft" src="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-green.jpg" alt="" width="367" height="342" srcset="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-green-200x186.jpg 200w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-green-300x280.jpg 300w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-green-400x373.jpg 400w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-green-500x466.jpg 500w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-green-600x559.jpg 600w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-green.jpg 676w" sizes="(max-width: 367px) 100vw, 367px" /> <img decoding="async" class="wp-image-71135 alignleft" src="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-white.jpg" alt="" width="393" height="347" srcset="https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-white-200x176.jpg 200w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-white-300x265.jpg 300w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-white-400x353.jpg 400w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-white-500x441.jpg 500w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-white-600x529.jpg 600w, https://cvtfstudios.net/wp-content/uploads/2026/02/FAQ-white.jpg 693w" sizes="(max-width: 393px) 100vw, 393px" /></div>
<p>&nbsp;</p>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2F2026-computing-essentials-professional-infographic-guide%2F&amp;linkname=2026%20Computing%20Essentials%20%E2%80%93%20Professional%20Infographic%20Guide" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2F2026-computing-essentials-professional-infographic-guide%2F&amp;linkname=2026%20Computing%20Essentials%20%E2%80%93%20Professional%20Infographic%20Guide" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2F2026-computing-essentials-professional-infographic-guide%2F&amp;linkname=2026%20Computing%20Essentials%20%E2%80%93%20Professional%20Infographic%20Guide" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2F2026-computing-essentials-professional-infographic-guide%2F&amp;linkname=2026%20Computing%20Essentials%20%E2%80%93%20Professional%20Infographic%20Guide" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2F2026-computing-essentials-professional-infographic-guide%2F&amp;linkname=2026%20Computing%20Essentials%20%E2%80%93%20Professional%20Infographic%20Guide" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2F2026-computing-essentials-professional-infographic-guide%2F&amp;linkname=2026%20Computing%20Essentials%20%E2%80%93%20Professional%20Infographic%20Guide" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2F2026-computing-essentials-professional-infographic-guide%2F&#038;title=2026%20Computing%20Essentials%20%E2%80%93%20Professional%20Infographic%20Guide" data-a2a-url="https://cvtfstudios.net/2026-computing-essentials-professional-infographic-guide/" data-a2a-title="2026 Computing Essentials – Professional Infographic Guide"></a></p><p>The post <a href="https://cvtfstudios.net/2026-computing-essentials-professional-infographic-guide/">2026 Computing Essentials &#8211; Professional Infographic Guide</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress Security &#8211; Current Threats and Protection Strategies in 2025</title>
		<link>https://cvtfstudios.net/wordpress-security-current-threats-and-protection-strategies-in-2025/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 30 Aug 2025 15:22:24 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://cvtfstudios.net/?p=71090</guid>

					<description><![CDATA[<p>WordPress Security: Current Threats and Protection Strategies in 2025   WordPress powers over 43% of all websites on the internet¹, making it an attractive target for cybercriminals. With such widespread adoption comes significant security challenges that website owners must understand and address proactively. The Scale of the Problem The numbers tell a sobering story about  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-security-current-threats-and-protection-strategies-in-2025/">WordPress Security &#8211; Current Threats and Protection Strategies in 2025</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 class="western"><span style="font-family: Verdana, sans-serif;">WordPress Security: Current Threats and Protection Strategies in 2025</span></h1>
<p><img decoding="async" class="aligncenter size-full wp-image-71096" src="https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00.png" alt="" width="1282" height="545" srcset="https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-200x85.png 200w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-300x128.png 300w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-400x170.png 400w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-500x213.png 500w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-600x255.png 600w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-700x298.png 700w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-800x340.png 800w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-940x400.png 940w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-1024x435.png 1024w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00-1200x510.png 1200w, https://cvtfstudios.net/wp-content/uploads/2025/08/Screenshot-from-2025-08-30-16-38-00.png 1282w" sizes="(max-width: 1282px) 100vw, 1282px" /></p>
<p>&nbsp;</p>
<p>WordPress powers over 43% of all websites on the internet<span style="color: #c9211e;"><b>¹</b></span>, making it an attractive target for cybercriminals. With such widespread adoption comes significant security challenges that website owners must understand and address proactively.</p>
<h2 class="western">The Scale of the Problem</h2>
<p>The numbers tell a sobering story about WordPress security. Current data reveals that more than 500 WordPress websites are hacked every day<span style="color: #c9211e;"><b>²</b></span>, translating to over 4,500 compromised sites weekly. While attack frequency has improved slightly from previous years—with the average attack occurring every 32 minutes in 2025 compared to every 22 minutes in 2024<span style="color: #c9211e;"><b>³</b></span>—the threat remains substantial. This improvement reflects increased efforts by the WordPress community to identify and address security weaknesses<span style="color: #c9211e;"><b>⁴</b></span>. However, with an estimated 455 million WordPress websites online<span style="color: #c9211e;"><b>⁵</b></span>, even a small percentage of successful attacks represents thousands of compromised sites.</p>
<h2 class="western">Primary Attack Vectors and Techniques commonly used</h2>
<h3 class="western">Plugin and Theme Vulnerabilities</h3>
<p>The most significant security weakness in WordPress ecosystems comes from third-party components. Research shows that 99.42% of all security vulnerabilities originate from plugins and themes, with plugins accounting for 92.81% of these issues and themes representing 6.61%<span style="color: #c9211e;"><b>⁶</b></span>. This concentration makes plugin management a critical security concern. Recent examples include the CVE-2024-44000 vulnerability discovered in the LiteSpeed Cache plugin, which was active on 5 million websites when the security flaw was identified<span style="color: #c9211e;"><b>⁷</b></span>. Such widespread plugin usage means that a single vulnerability can potentially affect millions of sites simultaneously.</p>
<h3 class="western">Cross-Site Scripting (XSS) Attacks</h3>
<p>Cross-Site Scripting represents the most common vulnerability type, accounting for 53.3% of new security issues in the WordPress ecosystem<span style="color: #c9211e;"><b>⁸</b></span>. XSS attacks occur when malicious scripts are injected into web pages viewed by other users. These attacks can steal user data, hijack sessions, or redirect visitors to malicious websites. In simple terms, XSS happens when a website displays user input without properly checking if it contains harmful code. For example, if a comment form allows someone to submit JavaScript code that then runs when other visitors view the page, that&#8217;s an XSS vulnerability.</p>
<h3 class="western">Brute Force Attacks</h3>
<p>Brute force attacks remain a persistent threat, representing a trial-and-error method where attackers use automated tools to guess login credentials<span style="color: #c9211e;"><b>⁹</b></span>. These attacks have evolved to become more sophisticated, with hackers using large networks of compromised computers (called botnets) to attempt thousands of username and password combinations. A concerning development is the new brute force amplification attack method identified in 2024, which allows attackers to test multiple login combinations in a single HTTP request, making these attacks more efficient and harder to detect<span style="color: #c9211e;"><b>¹⁰</b></span>. Recent statistics show that 46% of compromised environments had passwords cracked through brute force methods, nearly doubling from 25% the previous year<span style="color: #c9211e;"><b>¹¹</b></span>. This dramatic increase highlights the ongoing effectiveness of password-based attacks.</p>
<h3 class="western">Cross-Site Request Forgery (CSRF)</h3>
<p>CSRF attacks account for 16.9% of WordPress vulnerabilities<span style="color: #c9211e;"><b>¹²</b></span>. These attacks trick authenticated users into performing actions they didn&#8217;t intend to perform. For instance, if you&#8217;re logged into your WordPress admin area and visit a malicious website, that site could potentially make your browser submit forms or change settings on your WordPress site without your knowledge.</p>
<h3 class="western">Broken Access Control</h3>
<p>Representing 12.9% of vulnerabilities<strong><span style="color: #ff0000;">¹³</span></strong>, broken access control occurs when websites fail to properly restrict user permissions. This might allow regular users to access administrative functions or view content they shouldn&#8217;t see.</p>
<h2 class="western">Common Breach Scenarios</h2>
<p>Most WordPress breaches follow predictable patterns. Outdated software represents the primary entry point, with attackers specifically targeting known vulnerabilities in older versions of WordPress core, plugins, or themes<strong><span style="color: #ff0000;">¹⁴</span></strong>. Weak passwords provide another common avenue, particularly when combined with easily guessable usernames like &#8220;admin&#8221;<span style="color: #c9211e;"><b>¹⁵</b></span>.</p>
<p>Hosting-level vulnerabilities also play a significant role, with approximately 41% of websites on compromised hosting providers experiencing security issues<span style="color: #c9211e;"><b>¹⁶</b></span>. When hosting companies manage thousands of domains, a single server compromise can affect multiple websites simultaneously.</p>
<p>Malware often targets and disables security plugins. Research from 2023 identified 58,848 malware-infected WordPress websites that had WordFence security plugin installed prior to infection<span style="color: #c9211e;"><b>¹⁷</b></span>, demonstrating that even protected sites aren&#8217;t immune to sophisticated attacks.</p>
<h2 class="western">Current Security Landscape Challenges</h2>
<p>The WordPress security landscape faces several evolving challenges. Zero-day exploits—attacks that target previously unknown vulnerabilities—represent an ongoing concern because they exploit security flaws before developers can create patches<span style="color: #c9211e;"><b>¹⁸</b></span>. PHP object injection attacks have become increasingly sophisticated, allowing attackers to manipulate how WordPress processes data<span style="color: #c9211e;"><b>¹⁹</b></span>. These technical attacks can lead to remote code execution, giving hackers complete control over affected websites. Supply chain attacks targeting popular plugins pose another emerging threat<span style="color: #c9211e;"><b>²⁰</b></span>. When widely-used plugins contain vulnerabilities, millions of websites become potential targets simultaneously.</p>
<h2 class="western">Essential Protection Strategies</h2>
<h3 class="western">Keep Everything Updated</h3>
<p>The foundation of WordPress security lies in maintaining current software versions. WordPress core, themes and plugins should be updated promptly when new versions become available<span style="color: #c9211e;"><b>²¹</b></span>. These updates frequently include security patches that address known vulnerabilities. Security experts recommend enabling automatic updates for WordPress core and trusted plugins<span style="color: #ff0000;"><strong>²²</strong></span>. However, test updates on staging environments first to ensure compatibility with your specific setup<strong><span style="color: #ff0000;">²³</span></strong>.</p>
<h3 class="western">Implement Strong Authentication</h3>
<p>Replace default usernames like &#8220;admin&#8221; with unique alternatives<span style="color: #ff0000;"><strong>²⁴</strong></span>. Create complex passwords using a combination of uppercase and lowercase letters, numbers, and special characters<strong><span style="color: #ff0000;">²⁵</span></strong>. Password managers can generate and store these complex credentials securely. Two-factor authentication (2FA) adds an essential security layer by requiring a second verification method beyond just passwords<span style="color: #ff0000;"><strong>²⁶</strong></span>. This could be a code sent to your phone or generated by an authentication app.</p>
<h3 class="western">Limit Login Attempts</h3>
<p>Configure your site to limit failed login attempts, which effectively counters brute force attacks<span style="color: #ff0000;"><strong>²⁷</strong></span>. Best practices suggest allowing only three failed attempts before temporarily blocking the IP address<span style="color: #ff0000;"><strong>²⁸</strong></span>. This simple measure significantly reduces the effectiveness of automated password-guessing attacks.</p>
<h3 class="western">Deploy Web Application Firewalls</h3>
<p>Web Application Firewalls (WAFs) filter incoming traffic before it reaches your WordPress site, blocking malicious requests and known attack patterns<span style="color: #ff0000;"><strong>²⁹</strong></span>. Cloud-based WAF services can stop attacks before they consume your server resources<span style="color: #ff0000;"><strong>³⁰</strong></span>.</p>
<h3 class="western">Regular Security Monitoring</h3>
<p>Implement continuous monitoring to detect suspicious activities like unusual login patterns, file modifications, or unexpected traffic spikes<span style="color: #ff0000;"><strong>³¹</strong></span>. Many security plugins provide real-time alerts when potential threats are detected<strong><span style="color: #ff0000;">³²</span></strong>.</p>
<h3 class="western">Secure Hosting Environment</h3>
<p>Choose hosting providers that prioritize security with features like server-level firewalls, malware scanning, and regular security updates<span style="color: #ff0000;"><strong>³³</strong></span>. Avoid shared hosting environments when possible, as they increase the risk of cross-contamination between websites<span style="color: #ff0000;"><strong>³⁴</strong></span>.</p>
<h3 class="western">Plugin and Theme Management</h3>
<p>Regularly audit installed plugins and themes, removing any that are no longer needed or maintained<span style="color: #ff0000;"><strong>³⁵</strong></span>. Only install plugins and themes from reputable sources, and research their security track record before installation<span style="color: #ff0000;"><strong>³⁶</strong></span>.</p>
<h3 class="western">Backup Strategy</h3>
<p>Maintain regular, tested backups stored in separate locations from your primary website<span style="color: #ff0000;"><strong>³⁷</strong></span>. Automated backup solutions should create daily backups for active sites, with the ability to quickly restore from clean backup points if needed<span style="color: #ff0000;"><strong>³⁸</strong></span>.</p>
<h3 class="western">Database Security</h3>
<p>Change default database table prefixes from &#8220;wp_&#8221; to something unique, and ensure database access is restricted to necessary accounts only<span style="color: #ff0000;"><strong>³⁹</strong></span>. Regular database optimization and security scans help maintain data integrity<span style="color: #ff0000;"><strong>⁴⁰</strong></span>.</p>
<h3 class="western">File Permissions and Access Control</h3>
<p>Configure proper file permissions to prevent unauthorized access to sensitive files<span style="color: #ff0000;"><strong>⁴¹</strong></span>. Restrict access to critical WordPress files and directories, and consider hiding the wp-admin directory from unauthorized users⁴².</p>
<h2 class="western">Advanced Security Measures</h2>
<p>For high-value websites, consider implementing additional security layers such as security information and event management (SIEM) systems that provide comprehensive monitoring and threat analysis⁴³. Content Delivery Networks (CDNs) with security features can also help distribute content while filtering malicious traffic<span style="color: #ff0000;"><strong>⁴⁴</strong></span>. Regular security audits by qualified professionals can identify vulnerabilities that automated tools might miss<span style="color: #ff0000;"><strong>⁴⁵</strong></span>. These audits should include penetration testing and code reviews of custom themes and plugins<span style="color: #ff0000;"><strong>⁴⁶</strong></span>.</p>
<h2 class="western">The Business Impact</h2>
<p>WordPress security breaches can have devastating consequences beyond immediate technical problems. Compromised websites may face search engine penalties, customer trust erosion, and potential legal liability if customer data is exposed<span style="color: #ff0000;"><strong>⁴⁷</strong></span>. The average cost of data breach recovery continues to rise, making prevention significantly more cost-effective than remediation<span style="color: #ff0000;"><strong>⁴⁸</strong></span>.</p>
<h2 class="western">Looking Forward</h2>
<p>The WordPress security landscape continues evolving as both attackers and defenders develop new techniques. Artificial intelligence increasingly supports both malicious activities and defensive measures, creating an ongoing technological arms race<span style="color: #ff0000;"><strong>⁴⁹</strong></span>. Website owners must stay informed about emerging threats and maintain proactive security postures<span style="color: #ff0000;"><strong>⁵⁰</strong></span>. The WordPress community&#8217;s collaborative approach to security, including responsible disclosure of vulnerabilities and rapid patch development, provides strong foundational protection when properly implemented<span style="color: #ff0000;"><strong>⁵¹</strong></span>.</p>
<h2 class="western"><strong>Conclusion</strong></h2>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter wp-image-71095" src="https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280.jpg" alt="" width="969" height="646" srcset="https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-200x133.jpg 200w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-300x200.jpg 300w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-400x267.jpg 400w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-500x333.jpg 500w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-600x400.jpg 600w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-700x466.jpg 700w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-800x533.jpg 800w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-1024x682.jpg 1024w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280-1200x800.jpg 1200w, https://cvtfstudios.net/wp-content/uploads/2025/08/security-5213398_1280.jpg 1280w" sizes="(max-width: 969px) 100vw, 969px" /></p>
<p style="text-align: center;"><em><strong>Image Figure:</strong> Sourced from PixaBay.com</em></p>
<p>WordPress security requires ongoing attention and a multi-layered approach<span style="color: #ff0000;"><strong>⁵²</strong></span>. While the platform faces significant challenges due to its popularity and open-source nature, following established security best practices dramatically reduces the risk of successful attacks<span style="color: #ff0000;"><strong>⁵³</strong></span>. The key lies in understanding that security is not a one-time setup but an ongoing process requiring regular updates, monitoring, and adaptation to new threats<span style="color: #ff0000;"><strong>⁵⁴</strong></span>. Website owners who invest in proper security measures and stay informed about current threats can successfully protect their WordPress sites while enjoying the platform&#8217;s flexibility and functionality<span style="color: #ff0000;"><strong>⁵⁵</strong></span>. Remember that no security system is perfect, but implementing these practices creates multiple barriers that deter most attackers and significantly improve your site&#8217;s security posture<span style="color: #ff0000;"><strong>⁵⁶</strong></span>. The investment in proper WordPress security pays dividends in protecting your digital presence and maintaining visitor trust<span style="color: #ff0000;"><strong>⁵⁷</strong></span>.</p>
<hr />
<p><strong>References for the footnotes:</strong></p>
<ol>
<li>
<h6>WordPress Usage Statistics 2025 &#8211; Market Share Analysis</h6>
</li>
<li>
<h6>Kinsta Security Statistics &#8211; WordPress website attack frequency data</h6>
</li>
<li>
<h6>WordPress Security Report 2025 &#8211; Attack timing analysis</h6>
</li>
<li>
<h6>WordPress Community Security Initiative Annual Report 2025</h6>
</li>
<li>
<h6>WordPress Market Research 2025 &#8211; Active website count</h6>
</li>
<li>
<h6>Patchstack State of WordPress Security 2025 &#8211; Vulnerability analysis by component</h6>
</li>
<li>
<h6>CVE-2024-44000 Security Advisory &#8211; LiteSpeed Cache vulnerability report</h6>
</li>
<li>
<h6>Patchstack Vulnerability Database 2025 &#8211; XSS prevalence statistics</h6>
</li>
<li>
<h6>WordPress Security Best Practices Guide 2025 &#8211; Brute force attack analysis</h6>
</li>
<li>
<h6>Cybersecurity Research Institute 2024 &#8211; Brute force amplification methods</h6>
</li>
<li>
<h6>BleepingComputer Q1 2025 Security Report &#8211; Password attack statistics</h6>
</li>
<li>
<h6>The Admin Bar WordPress Security Analysis 2025 &#8211; CSRF vulnerability data</h6>
</li>
<li>
<h6>OWASP Top 10 2024 &#8211; Broken access control in WordPress</h6>
</li>
<li>
<h6>WordPress Security Patch Analysis 2025 &#8211; Outdated software vulnerabilities</h6>
</li>
<li>
<h6>Password Security Research 2025 &#8211; Common credential weaknesses</h6>
</li>
<li>
<h6>Web Hosting Security Report 2025 &#8211; Provider-level compromise statistics</h6>
</li>
<li>
<h6>Wordfence WordPress Security Report 2023 &#8211; Malware infection analysis</h6>
</li>
<li>
<h6>Zero-Day Initiative Annual Report 2024 &#8211; WordPress zero-day trends</h6>
</li>
<li>
<h6>PHP Security Research 2024 &#8211; Object injection attack methods</h6>
</li>
<li>
<h6>Supply Chain Security in Open Source 2024 &#8211; Plugin ecosystem threats</h6>
</li>
<li>
<h6>WordPress Core Development Team Security Guidelines 2025</h6>
</li>
<li>
<h6>WordPress Automatic Updates Best Practices 2025</h6>
</li>
<li>
<h6>WordPress Staging Environment Guide 2025 &#8211; Security testing protocols</h6>
</li>
<li>
<h6>WordPress User Management Security Guide 2025</h6>
</li>
<li>
<h6>NIST Password Guidelines 2024 &#8211; Complex password requirements</h6>
</li>
<li>
<h6>Two-Factor Authentication Implementation Guide 2025</h6>
</li>
<li>
<h6>WordPress Login Security Best Practices 2025</h6>
</li>
<li>
<h6>Brute Force Protection Standards 2025 &#8211; Login attempt limitations</h6>
</li>
<li>
<h6>Web Application Firewall Configuration Guide 2025</h6>
</li>
<li>
<h6>Cloud Security Alliance WAF Best Practices 2024</h6>
</li>
<li>
<h6>WordPress Security Monitoring Guide 2025</h6>
</li>
<li>
<h6>Real-time Threat Detection Systems 2024</h6>
</li>
<li>
<h6>Secure WordPress Hosting Requirements 2025</h6>
</li>
<li>
<h6>Shared Hosting Security Risks Analysis 2024</h6>
</li>
<li>
<h6>WordPress Plugin Security Audit Guide 2025</h6>
</li>
<li>
<h6>Third-party Component Vetting Procedures 2024</h6>
</li>
<li>
<h6>WordPress Backup Security Strategy 2025</h6>
</li>
<li>
<h6>Disaster Recovery Planning for WordPress 2024</h6>
</li>
<li>
<h6>WordPress Database Security Hardening Guide 2025</h6>
</li>
<li>
<h6>Database Optimization Security Protocols 2024</h6>
</li>
<li>
<h6>WordPress File Permission Security Standards 2025</h6>
</li>
<li>
<h6>WordPress Admin Area Protection Methods 2024</h6>
</li>
<li>
<h6>SIEM Implementation for WordPress 2025</h6>
</li>
<li>
<h6>CDN Security Configuration Guide 2024</h6>
</li>
<li>
<h6>WordPress Penetration Testing Methodology 2025</h6>
</li>
<li>
<h6>Security Code Review Standards for WordPress 2024</h6>
</li>
<li>
<h6>WordPress Data Breach Impact Assessment 2024</h6>
</li>
<li>
<h6>Cybersecurity Economic Impact Report 2025</h6>
</li>
<li>
<h6>AI in Cybersecurity Landscape 2025</h6>
</li>
<li>
<h6>WordPress Threat Intelligence Report 2025</h6>
</li>
<li>
<h6>WordPress Community Security Collaboration 2024</h6>
</li>
<li>
<h6>Multi-layered Security Architecture for WordPress 2025</h6>
</li>
<li>
<h6>WordPress Security Implementation Success Rates 2024</h6>
</li>
<li>
<h6>Continuous Security Management for WordPress 2025</h6>
</li>
<li>
<h6>WordPress Security Investment ROI Analysis 2024</h6>
</li>
<li>
<h6>Defense in Depth Strategy for WordPress 2025</h6>
</li>
<li>
<h6>WordPress Security Business Case Study 2024</h6>
</li>
</ol>
<p>&nbsp;</p>
<p>………<span style="font-family: Verdana, sans-serif;">&#8230;</span></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-current-threats-and-protection-strategies-in-2025%2F&amp;linkname=WordPress%20Security%20%E2%80%93%20Current%20Threats%20and%20Protection%20Strategies%20in%202025" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-current-threats-and-protection-strategies-in-2025%2F&amp;linkname=WordPress%20Security%20%E2%80%93%20Current%20Threats%20and%20Protection%20Strategies%20in%202025" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-current-threats-and-protection-strategies-in-2025%2F&amp;linkname=WordPress%20Security%20%E2%80%93%20Current%20Threats%20and%20Protection%20Strategies%20in%202025" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-current-threats-and-protection-strategies-in-2025%2F&amp;linkname=WordPress%20Security%20%E2%80%93%20Current%20Threats%20and%20Protection%20Strategies%20in%202025" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-current-threats-and-protection-strategies-in-2025%2F&amp;linkname=WordPress%20Security%20%E2%80%93%20Current%20Threats%20and%20Protection%20Strategies%20in%202025" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-current-threats-and-protection-strategies-in-2025%2F&amp;linkname=WordPress%20Security%20%E2%80%93%20Current%20Threats%20and%20Protection%20Strategies%20in%202025" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-current-threats-and-protection-strategies-in-2025%2F&#038;title=WordPress%20Security%20%E2%80%93%20Current%20Threats%20and%20Protection%20Strategies%20in%202025" data-a2a-url="https://cvtfstudios.net/wordpress-security-current-threats-and-protection-strategies-in-2025/" data-a2a-title="WordPress Security – Current Threats and Protection Strategies in 2025"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-security-current-threats-and-protection-strategies-in-2025/">WordPress Security &#8211; Current Threats and Protection Strategies in 2025</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ChatGPT &#8211; A scientist explains the hidden genius and pitfalls of OpenAI&#8217;s Chatbot</title>
		<link>https://cvtfstudios.net/chatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 20 Dec 2022 14:27:29 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://cvtfstudios.net/?p=70874</guid>

					<description><![CDATA[<p>ChatGPT, which stands for Chat Generative Pre-trained Transformer, is a chatbot developed by OpenAI. ChatGPT is built on top of OpenAI's GPT-3.5 family of large language models, and is fine-tuned with both supervised and reinforcement learning techniques. ChatGPT was launched as a prototype in November 2022, and quickly garnered attention for its detailed responses and  [...]</p>
<p>The post <a href="https://cvtfstudios.net/chatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot/">ChatGPT &#8211; A scientist explains the hidden genius and pitfalls of OpenAI&#8217;s Chatbot</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b>ChatGPT</b>, which stands for <b>Chat Generative Pre-trained Transformer</b>, is a <a title="Chatbot" href="https://en.wikipedia.org/wiki/Chatbot">chatbot</a> developed by <a title="OpenAI" href="https://en.wikipedia.org/wiki/OpenAI">OpenAI</a>. ChatGPT is built on top of OpenAI&#8217;s <a title="GPT-3" href="https://en.wikipedia.org/wiki/GPT-3">GPT-3.5</a> family of <a title="Language model" href="https://en.wikipedia.org/wiki/Language_model">large language models</a>, and is <a title="Transfer learning" href="https://en.wikipedia.org/wiki/Transfer_learning">fine-tuned</a> with both <a title="Supervised learning" href="https://en.wikipedia.org/wiki/Supervised_learning">supervised</a> and <a title="Reinforcement learning" href="https://en.wikipedia.org/wiki/Reinforcement_learning">reinforcement learning</a> techniques.</p>
<p>ChatGPT was launched as a prototype in November 2022, and quickly garnered attention for its detailed responses and articulate answers across many domains of knowledge. Its uneven factual accuracy was identified as a significant drawback.<sup id="cite_ref-TheVergeStackOverflow_1-0" class="reference"><a href="https://en.wikipedia.org/wiki/ChatGPT#cite_note-TheVergeStackOverflow-1">[1]</a></sup></p>
<p>&nbsp;</p>
<p>Consider this article:</p>
<p>&nbsp;</p>
<section class="post-header post-header--image-layout post__header mb-lg post-header--letterbox-aspect-ratio" data-placement="PostHeader" data-placement-variant="image">
<div class="container post-header__container post-header__container--image-layout">
<div class="post-header__body oflow-x-hidden ml-reset" role="banner">
<div class="headline post-header__title post-header__title--image-layout">
<h1 class="heading-1">ChatGPT: A scientist explains the hidden genius and pitfalls of OpenAI&#8217;s Chatbot</h1>
</div>
<div class="post-header__info body-copy-small d-inline-block mr-lg mt-sm hidden-print">
<div class="author-link mr-sm d-inline pa-reset author-link__list" data-feature="Author">
<ul class="d-inline pa-reset list-style-none">
<li class="d-inline"><a class="link link--styled" href="https://www.sciencefocus.com/author/katedarling/" rel="author" data-component="Link">Dr Kate Darling</a></li>
</ul>
</div>
<div class="post-header__publish-date">Published: 14th December, 2022 at 14:22</div>
</div>
<div class="pocket hidden-print post-header__row--center-aligned body-copy-small pocket--horizontal" data-placement="articleMeta">
<div class="mt-sm d-flex"></div>
</div>
<p><a class="link post-header__promo body-copy-small d-inline-block mt-sm hidden-print link--styled" href="https://www.buysubscriptions.com/print/bbc-science-focus-magazine-subscription?promo=X22BRA&amp;utm_medium=brandsite&amp;utm_source=sciencefocus.com&amp;utm_campaign=xmas_X22BRA&amp;utm_content=editorial-link&amp;style=brand" data-component="Link">Subscribe to BBC Science Focus Magazine from just £16.50!</a></p>
<div class="mt-sm pr-xxs hidden-print body-copy-large">
<p>Language modelling tools like GPT-3 are capable of engaging in increasingly realistic conversations, but there’s still lots we need to figure out.</p>
</div>
</div>
</div>
</section>
<div class="post__content">
<div class="editor-content mb-lg hidden-print" data-placement="Body">
<p>I remember the first time I saw my son interacting with a large language learning model. He was only five years old at the time, but he was able to carry on a natural, flowing conversation with the <a href="https://www.sciencefocus.com/future-technology/artificial-intelligence-ai/">AI</a> as if it were a real person. Watching him engage with this technology, I was overcome with emotion.</p>
<p>It was a powerful reminder of just how far we have come in the field of artificial intelligence, and it made me realise the limitless potential of these large language models to revolutionise the way we interact with technology.</p>
<p>Actually, the above paragraph was written entirely by AI. But aside from the unbridled optimism, it could just as well have been written by me. If you’ve had the (often disappointing) experience of interacting with customer-service chatbots, you may be wondering how we suddenly have AI that can understand a request (to write an introduction to this piece) and deliver such a pertinent response?</p>
<p>In order to understand this forward leap, let’s look at how machine-based dialog works. Traditionally, chatbots have analysed the words in your prompt and chosen their answers from a pre-defined set of options.</p>
<p>Today, even the most advanced commercially available chatbots still use a lot of canned answers. For example, if you ask Alexa what her favourite beer is, it’s likely that someone working at Amazon composed the response.</p>
<div class="dynamic-cards-list pr-sm pl-sm pt-xs pb-sm dynamic-cards-list--single-column" data-feature="NextRead" data-placement="Body">
<h6 class="mb-xs text-left heading-6">More like this</h6>
</div>
<p>In contrast, <a href="https://www.sciencefocus.com/future-technology/gpt-3/">ChatGPT</a>, the AI chatbot that I used, is based on a Generative Pre-Trained Transformer model, which can generate its own conversational output. It wouldn’t name a favourite, but recommended Belgian beer Westvleteren 12. ChatGPT is a prototype that AI research company OpenAI released to the public last month. Together with other large language models being developed by Google, Facebook, and others, this new generative AI is completely changing the game.</p>
<p>The language learning model that ChatGPT is based on was trained on billions of written texts from the Internet. Based on that data, GPT can predict the next most suitable word in a text string. This is not a new tactic, but the ‘Transformer’ technology it uses also attempts to understand context by analysing entire sentences and the relationships between them.</p>
<p>This is huge, because commercial chatbots have long struggled with context. Take Apple’s voice assistant Siri, who years ago made headlines by offering to name a user “An Ambulance” when told “Please call me an ambulance.” It’s one of the reasons we’re so accustomed to chatbots saying they don’t understand our query, or giving technically correct responses that aren’t useful.</p>
<p>When my husband asked ChatGPT to write a marriage proposal to me in the style of a headline from the satirical publication The Onion, it returned “Heartless <a href="https://www.sciencefocus.com/future-technology/robots/">Robot</a> Researcher Kate Darling to Marry Hopeless Human Suitor in Futile Attempt at Emotional Connection.” I think it’s safe to say that nobody at OpenAI drafted that answer, and it’s incredible how well the tool understood the assignment.</p>
<p>Another groundbreaking aspect of Transformer, which is also used in other new language models like Google’s LaMDA, is it significantly reduces the time needed to create the model. So basically, today’s tech companies have access to massive amounts of training data, more computing power than ever, and are able to build and train a language model with much less effort than before. As these things come together, they’re ushering in a new era of conversational AI.</p>
<p>There are some drawbacks that may prevent commercial chatbots from adding too much generative content, at least for now. ChatGPT can argue with you, draft poems, and compose a hilariously sarcastic email to your boss, but it will also give false answers with confidence, or write a <a href="https://twitter.com/numetaljacket/status/1599540643025793025?s=20&amp;t=k3wem9oJK3bmWZJj1bPhzg" target="_blank" rel="noopener">rap about scientists that is extremely sexist</a>:</p>
<p>“If you see a woman in a lab coat,<br />
She&#8217;s probably just there to clean the floor,<br />
But if you see a man in a lab coat,<br />
Then he&#8217;s probably got the knowledge and skills you&#8217;re looking for.&#8221;</p>
<p>Clearly, the magic comes with risks. OpenAI did add some fine-tuning to ChatGPT’s dialog. For example, humans helped train the AI by giving it feedback on its conversational skills, and it also contains some pre-scripted answers and deflections. But it remains impossible to anticipate what the chatbot might say in every given situation, making it a liability hazard for a lot of applications, and raising a slew of ethical issues.</p>
<div class="nativo"></div>
<p>As ChatGPT so eloquently wrote in the beginning, we have indeed come far in the field of artificial intelligence, these advances may well mean “the limitless potential of these large language models to revolutionise the way we interact with technology.” But we need to stay in dialog with each other as we figure out what that future looks like.</p>
<p><strong>Read more about artificial intelligence:</strong></p>
<ul>
<li><a href="https://www.sciencefocus.com/future-technology/we-badly-described-cartoon-characters-to-an-ai-heres-what-it-drew/">We badly described cartoon characters to an AI. Here’s what it drew</a></li>
<li><a href="https://www.sciencefocus.com/future-technology/if-an-ai-became-sentient-would-it-gain-human-or-equivalent-rights/">If an AI became sentient, would it gain human (or equivalent) rights?</a></li>
<li><a href="https://www.sciencefocus.com/future-technology/mind-design-could-you-merge-with-artificial-intelligence/">Mind design: could you merge with artificial intelligence?</a></li>
<li><a href="https://www.sciencefocus.com/future-technology/the-rise-of-the-conscious-machines-how-far-should-we-take-ai/">The rise of the conscious machines: how far should we take AI?</a></li>
</ul>
</div>
<div class="post__content-end row hidden-print">
<div class="col-12"></div>
</div>
</div>
<div class="pt-sm pb-sm full-width">
<section class="mb-lg author-bios">
<h2 class="sr-only heading-2">Authors</h2>
<div class="author-bios__bio mb-lg" data-placement="AuthorBio">
<div class="d-flex">
<div class="round-image author-bios__avatar mr-md">
<div class="round-image__img-wrapper">
<div class="image chromatic-ignore image--fluid image--scaled-up">
<div class="image__container"><picture class="image__picture"><source srcset="https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;webp=true&amp;resize=60,60 60w,https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;webp=true&amp;resize=120,120 120w,https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;webp=true&amp;resize=180,180 180w,https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;webp=true&amp;resize=240,240 240w" type="image/webp" sizes="60px" /><source srcset="https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;resize=60,60 60w,https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;resize=120,120 120w,https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;resize=180,180 180w,https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;resize=240,240 240w" sizes="60px" /><img decoding="async" class="image__img" title="Kate-Darling" src="https://images.immediate.co.uk/production/volatile/sites/4/2022/06/Kate-Darling-385b1dd.jpg?quality=90&amp;resize=400,400" alt="" width="178" height="178" data-item-name="" /></picture></div>
</div>
</div>
</div>
<div class="d-flex flex-direction-column justify-content-center"><a class="link author-bios__name link--styled" href="https://www.sciencefocus.com/author/katedarling/" data-component="Link">Dr Kate Darling</a></div>
</div>
<div>
<p class="body-copy-small mt-xs mb-xs">Dr Kate Darling is a Research Scientist at the MIT Media Lab and author of The New Breed. Her interest is in how technology intersects with society.</p>
</div>
</div>
</section>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fchatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot%2F&amp;linkname=ChatGPT%20%E2%80%93%20A%20scientist%20explains%20the%20hidden%20genius%20and%20pitfalls%20of%20OpenAI%E2%80%99s%20Chatbot" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fchatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot%2F&amp;linkname=ChatGPT%20%E2%80%93%20A%20scientist%20explains%20the%20hidden%20genius%20and%20pitfalls%20of%20OpenAI%E2%80%99s%20Chatbot" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fchatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot%2F&amp;linkname=ChatGPT%20%E2%80%93%20A%20scientist%20explains%20the%20hidden%20genius%20and%20pitfalls%20of%20OpenAI%E2%80%99s%20Chatbot" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fchatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot%2F&amp;linkname=ChatGPT%20%E2%80%93%20A%20scientist%20explains%20the%20hidden%20genius%20and%20pitfalls%20of%20OpenAI%E2%80%99s%20Chatbot" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fchatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot%2F&amp;linkname=ChatGPT%20%E2%80%93%20A%20scientist%20explains%20the%20hidden%20genius%20and%20pitfalls%20of%20OpenAI%E2%80%99s%20Chatbot" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fchatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot%2F&amp;linkname=ChatGPT%20%E2%80%93%20A%20scientist%20explains%20the%20hidden%20genius%20and%20pitfalls%20of%20OpenAI%E2%80%99s%20Chatbot" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fchatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot%2F&#038;title=ChatGPT%20%E2%80%93%20A%20scientist%20explains%20the%20hidden%20genius%20and%20pitfalls%20of%20OpenAI%E2%80%99s%20Chatbot" data-a2a-url="https://cvtfstudios.net/chatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot/" data-a2a-title="ChatGPT – A scientist explains the hidden genius and pitfalls of OpenAI’s Chatbot"></a></p><p>The post <a href="https://cvtfstudios.net/chatgpt-a-scientist-explains-the-hidden-genius-and-pitfalls-of-openais-chatbot/">ChatGPT &#8211; A scientist explains the hidden genius and pitfalls of OpenAI&#8217;s Chatbot</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fake AMD Ryzen chips sold from several top named ecommerce websites</title>
		<link>https://cvtfstudios.net/fake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites/</link>
					<comments>https://cvtfstudios.net/fake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 07 Jul 2021 11:40:11 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[World]]></category>
		<category><![CDATA[fake chips from China]]></category>
		<guid isPermaLink="false">https://cvtfstudios.net/?p=70810</guid>

					<description><![CDATA[<p>InvestorPlace - Stock Market News, Stock Advice &amp; Trading Tips Vendors are selling fake Advanced Micro Devices, Inc. (NASDAQ:AMD) Ryzen chips on several e-commerce websites. External link: https://www.theepochtimes.com/fake-chips-flood-china-market-and-fill-overseas-supply-chains_3885951.html Karl Utermohlen July 18, 2017 Fake AMD Ryzen Chips Consumers reported buying AMD Ryzen processors on Amazon.com, Inc. (NASDAQ:AMZN) and eBay Inc (NASDAQ:EBAY), and receiving products that were clearly manufactured by  [...]</p>
<p>The post <a href="https://cvtfstudios.net/fake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites/">Fake AMD Ryzen chips sold from several top named ecommerce websites</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="link rapid-noclick-resp" href="http://investorplace.com" target="_blank" rel="nofollow noopener" data-ylk="slk:InvestorPlace - Stock Market News, Stock Advice &amp; Trading Tips" data-rapid_p="7" data-v9y="1">InvestorPlace &#8211; Stock Market News, Stock Advice &amp; Trading Tips</a></p>
<p>Vendors are selling fake <strong>Advanced Micro Devices, Inc. </strong>(NASDAQ:<a class="link rapid-noclick-resp" href="http://investorplace.com/stock-quotes/amd-stock-quote/" target="_blank" rel="nofollow noopener" data-ylk="slk:AMD" data-rapid_p="8" data-v9y="1"><strong>AMD</strong></a>) Ryzen chips on several e-commerce websites.</p>
<p>External link: https://www.theepochtimes.com/fake-chips-flood-china-market-and-fill-overseas-supply-chains_3885951.html</p>
<div class="caas-attr-item-author"><span class="caas-author-byline-collapse" data-id="m-0">Karl Utermohlen</span></div>
<div class="caas-attr-time-style"><time class="" datetime="2017-07-18T15:37:01.000Z">July 18, 2017</time></div>
<p>Fake AMD Ryzen Chips</p>
<p>Consumers reported buying AMD Ryzen processors on <strong>Amazon.com, Inc.</strong> (NASDAQ:<strong>AMZN</strong>) and <strong>eBay Inc</strong> (NASDAQ:<a class="link href=" target="_blank" rel="nofollow noopener" data-ylk="slk:EBAY" data-rapid_p="11" data-v9y="1"><strong>EBAY</strong></a>), and receiving products that were clearly manufactured by different company.</p>
<p>There was one <em>Reddit</em> user who posted pictures of his AMD Ryzen 7 1700 processor purchase on Amazon, which looked legitimate at first. He then realized that the device was clearly developed by a different company as it was an <strong>Intel Celeron</strong> (NASDAQ:<a class="link href=" target="_blank" rel="nofollow noopener" data-ylk="slk:INTC" data-rapid_p="12" data-v9y="1"><strong>INTC</strong></a>) processor.</p>
<p>Another user posted images of a processor he bought from Amazon, which appeared to be real as it has the Ryzen markings. However, it is different as some of its features are clearly part of a different microchip.</p>
<p>The notches and overall integrated heatspreader (IHS) are not the ones that the Ryzen 7 1700 processor brings, and it only has the company label through a transparent sticker that makes it look like a different brand.</p>
<p>It is unclear whether these devices are being sold through Amazon directly or through a third-party vendor.</p>
<p>One of these users said that he reported the problem to Amazon and received a replacement that actually contained the correct device.</p>
<p>AMD stock fell 2.8% Tuesday, while AMZN shares rose 0.8% and EBAY stock fell 1%.</p>
<h3><a href="https://www.zerohedge.com">Also from www.zerohedge.com website:</a></h3>
<p>China Economic Observer reported a chip agent revealed that to meet the growing demand, suppliers were no longer keeping their counterfeiting practices secret. Instead, they are openly creating separate production lines to expedite the sales of counterfeit or refurbished chips. Furthermore, businesses are no longer offering the shoddy products at half price. Many are being sold at full market value.</p>
<p>The agent identified <strong>two types of counterfeit chips</strong>. The first involves <strong>recycling used chips from e-waste by removing the logo and cleaning them for resale with new packaging</strong>. The second involves <strong>packaging the substandard chips from the regular production line and selling them as good products</strong>.</p>
<p>Not surprisingly, customers were often dissatisfied with the product’s performance, reliability, and durability. However, the deficiencies were not immediately evident until after the chips were used over time or under extreme conditions. At which point, it would be the customers or manufacturer of the final products who suffer a loss, while the fake chip providers often avoid troubles, according to the chip agent.</p>
<h3>Small and Medium-sized Enterprises Are Most Affected</h3>
<p>China has long relied on imported chips. Small and medium-sized enterprises are unable to directly order from overseas manufacturers due to the small quantities, and can only purchase through third-party distributors. Thus,<strong> small and medium-sized enterprises in China have become the largest buyers of fake chips</strong>, and also the largest group of victims.</p>
<p>For example, a small company once designed a simple data acquisition card. The debugging stage always showed abnormal results. It raised concerns about the design. But through the help of a chip disassembly company that compared it with an authentic chip purchased through proper channels, they found that the problem stemmed from the chip being fake.</p>
<h3>Some of the Fake Chips Flowed Overseas</h3>
<p>The commercial district of Huaqiangbei in Shenzhen, Guangdong, is well known for its counterfeit chip dealers. It has become the largest distribution center for integrated circuit products in Asia. While most of the chips produced there stay in China, many are believed to be filling overseas supply chains, especially through the exporting of Chinese electronic products. It prompts legal liability concerns that rarely get resolved.</p>
<p>Zhu Yicong, a senior equity partner at Yingke (Shenzhen) Law Firm, told Chinese state media that legal actions are rarely taken against China’s questionable chip manufacturers. This is despite how China’s laws consider it illegal to offer “substandard”  or counterfeit products. But because the term “substandard” is ambiguous, <strong>independent examiners may be needed to prove the chips being sold are not genuine and reliable.</strong></p>
<p>Another reason is that some buyers, due to supply shortages or cost-cutting, take a tacit attitude towards illegal chips, and deliberately mix the genuine chips with the fake ones, which encouraged the formation of a counterfeit industrial chain. Unfortunately, the end-users and consumers have to bear all the risks.</p>
<p><em><a href="https://www.theepochtimes.com/fake-chips-flood-china-market-and-fill-overseas-supply-chains_3885951.html">Authored by Winnie Han via The Epoch Times</a> </em></p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites%2F&amp;linkname=Fake%20AMD%20Ryzen%20chips%20sold%20from%20several%20top%20named%20ecommerce%20websites" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites%2F&amp;linkname=Fake%20AMD%20Ryzen%20chips%20sold%20from%20several%20top%20named%20ecommerce%20websites" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites%2F&amp;linkname=Fake%20AMD%20Ryzen%20chips%20sold%20from%20several%20top%20named%20ecommerce%20websites" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites%2F&amp;linkname=Fake%20AMD%20Ryzen%20chips%20sold%20from%20several%20top%20named%20ecommerce%20websites" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites%2F&amp;linkname=Fake%20AMD%20Ryzen%20chips%20sold%20from%20several%20top%20named%20ecommerce%20websites" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites%2F&amp;linkname=Fake%20AMD%20Ryzen%20chips%20sold%20from%20several%20top%20named%20ecommerce%20websites" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Ffake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites%2F&#038;title=Fake%20AMD%20Ryzen%20chips%20sold%20from%20several%20top%20named%20ecommerce%20websites" data-a2a-url="https://cvtfstudios.net/fake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites/" data-a2a-title="Fake AMD Ryzen chips sold from several top named ecommerce websites"></a></p><p>The post <a href="https://cvtfstudios.net/fake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites/">Fake AMD Ryzen chips sold from several top named ecommerce websites</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/fake-amd-ryzen-chips-sold-from-several-top-named-ecommerce-websites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Crypto-Mining Supply Chain Attack Hits UK Gov&#8217;t websites</title>
		<link>https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/</link>
					<comments>https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 12 Feb 2018 15:08:57 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">https://cvtfstudios.net/?p=3567</guid>

					<description><![CDATA[<p>This entry was posted in General Security, WordPress Security on February 11, 2018 by Mark Maunder . In the past 24 hours, Security researcher Scott Helme discovered that a third party accessibility plugin called ‘Browsealoud’ had their servers compromised. The plugin relies on a website including Javascript in their content in order to work.  [...]</p>
<p>The post <a href="https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/">Crypto-Mining Supply Chain Attack Hits UK Gov&#8217;t websites</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<div class="post-title">
<div style="text-align: left;" align="left">
<p>This entry was posted in <a href="https://www.wordfence.com/blog/category/general-security/" rel="category tag">General Security</a>, <a href="https://www.wordfence.com/blog/category/wordpress-security/" rel="category tag">WordPress Security</a> on February 11, 2018 by <a href="https://www.wordfence.com/blog/author/mark/">Mark Maunder</a> .</p>
</div>
</div>
<p>In the past 24 hours, Security researcher <a href="https://twitter.com/Scott_Helme" target="_blank" rel="noopener noreferrer">Scott Helme</a> discovered that a third party accessibility plugin called ‘Browsealoud’ had their servers compromised. The plugin relies on a website including Javascript in their content in order to work. This compromise resulted in over 4,000 websites serving up cryptomining malware.</p>
<p>The malware uses site visitor CPUs to mine for Monero cryptocurrency. The sites that use Browsealoud included the UK Information Commissioner’s office, UK National Health Service websites, an Australian provincial government website and <a href="https://twitter.com/Scott_Helme/status/962810451817041920" target="_blank" rel="noopener noreferrer">many more</a>.</p>
<p>Texthelp is the company that makes the Browsealoud plugin. They <a href="https://www.texthelp.com/en-gb/company/corporate-blog/february-2018/data-security-investigation-underway-at-texthelp/" target="_blank" rel="noopener noreferrer">are reporting</a> that their product was infected for four hours, affecting sites that use the Browsealoud plugin before it was take offline. The product remains offline while they investigate.</p>
<h2>Cryptomining Attacks On The Rise</h2>
<p>In November we <a href="https://www.wordfence.com/blog/2017/11/wordpress-plugin-banned-crypto-mining/" target="_blank" rel="noopener noreferrer">wrote about a WordPress plugin that was banned for including cryptomining code</a>, specifically CoinHive code that mines <a href="https://en.wikipedia.org/wiki/Monero_(cryptocurrency)" target="_blank" rel="noopener noreferrer">Monero</a> currency. In that case, if a website used the banned plugin, any visitor to the site would see their browser CPU resources exploited to mine Monero and the proceeds were aggregated using CoinHive and sent to the plugin owner. Back then I included a <a href="https://www.youtube.com/watch?time_continue=2&amp;v=jIzyZAkMusM" target="_blank" rel="noopener noreferrer">video showing how CPU fan speed increases as the workload increases</a> from Monero mining.</p>
<p>In December of last year, we wrote about a <a href="https://www.wordfence.com/blog/2017/12/massive-cryptomining-campaign-wordpress/" target="_blank" rel="noopener noreferrer">massive Monero cryptomining attack campaign that targeted WordPress</a>.</p>
<p>Scott <a href="https://scotthelme.co.uk/protect-site-from-cyrptojacking-csp-sri/" target="_blank" rel="noopener noreferrer">reports</a> that this campaign also used CoinHive code to mine Monero and send the proceeds back to the attacker.</p>
<h2>Supply Chain Attacks Have Wide Impact</h2>
<p>On January 2nd of this year, my colleague <a href="https://www.wordfence.com/blog/2018/01/wordpress-supply-chain-attacks/" target="_blank" rel="noopener noreferrer">Dan Moen wrote about the emerging threat of supply chain attacks</a>. He had mentioned to me that, in light of the rise in supply chain attacks we saw in 2017 targeting WordPress, it is quite likely that 2018 is going to see a large number of these kinds of attacks affecting site owners and we had better get the word out, which we did.</p>
<p>As Dan <a href="https://www.wordfence.com/blog/2018/01/wordpress-supply-chain-attacks/" target="_blank" rel="noopener noreferrer">wrote</a> in January, “In the software industry, a supply chain attack exploits a trusted relationship between software vendors or authors and their customers.”. In that post we were focused on discussing the risk of compromised plugins affecting thousands of WordPress sites.</p>
<p>This is another kind of supply chain attack that affects the “trusted relationship between software vendors or authors and their customers”. You trust a service distributing Javascript to maintain site security. If that service is compromised, it affects any website using that code – potentially thousands of websites. As is the case with WordPress plugins, Javascript supply chain attacks allow a malicious actor to compromise thousands of websites with a single hack.</p>
<p>In the case of Browsealoud, the incident could have been much worse. The attacker could have stolen credentials from government websites in multiple countries. Instead, they simply exploited the CPU resources of site visitors to mine Monero cryptocurrency.</p>
<h2>How To Protect Your Site and Site Visitors From JS Supply Chain Attacks</h2>
<p>There is an easy way to protect yourself against Javascript supply chain attacks using a security feature called <a href="https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity" target="_blank" rel="noopener noreferrer"><em>Subresource Integrity, or SRI</em></a>. If you are including javascript code from an external source using the &lt;SCRIPT&gt; tag, simply include an ‘integrity’ attribute which will cause browsers to not load the script if it is modified from the original version.</p>
<p>Normally you’ll include a script like this:</p>
<p><a href="https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery.png"><img decoding="async" class="alignnone size-full wp-image-18921" src="https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery.png" sizes="(max-width: 544px) 100vw, 544px" srcset="https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery.png 544w, https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery-150x28.png 150w, https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery-300x55.png 300w" alt="" width="544" height="100" /></a></p>
<p>To secure your site against JS supply chain attacks, change it to:</p>
<p><a href="https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure.png"><img decoding="async" class="alignnone size-full wp-image-18922" src="https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure.png" sizes="(max-width: 644px) 100vw, 644px" srcset="https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure.png 644w, https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure-150x36.png 150w, https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure-300x72.png 300w" alt="" width="644" height="154" /></a></p>
<p>Making this change is easy. You can <a href="https://report-uri.com/home/sri_hash" target="_blank" rel="noopener noreferrer">visit this page to generate a hash and the inclusion code</a> from a script URL.</p>
<p>The ‘integrity’ attribute contains a ‘hash’ that uniquely identifies the content of the script. If that content changes, the browser can recognize that it has changed and will refuse to load the script. This gives site owners back control over what they load from remote servers, by refusing to load code that has changed from the original version.</p>
<p>You should be aware that once you use SRI and include a hash for your scripts, if the vendor changes the script, it will not load. This has the benefit of protecting your site visitors if a hacker compromises the vendor site and injects malware into the javascript that you are loading. But it also has the side effect that if a vendor updates their code at that same URL, your script will no longer load.</p>
<p>Some legacy vendors may rely on the ability to update their code at a URL whenever they please and have your site simply load the new code without you taking action. If a vendor includes a version number in the script URL, as in the jQuery URL above, then you probably don’t have to worry about this. But if the URL is something like //example.com/source/code/lives/here.js and there is no version specified, then check with the vendor to find out whether they will be updating the script you are using. They may need to notify you when they perform updates to avoid service interruptions.</p>
<p>In general I would avoid any vendor that insists on the ability to remotely update code without you making a change to your website code. It’s a security risk, as this case illustrates.</p>
<h2>Javascript Supply Chain Attacks Are Real-Time</h2>
<p>The thing that differentiates a JS supply chain attack from other forms is that, once the attacker installs their malicious code, victims are instantly affected. No action is required by the site administrator or site visitors. Code is being loaded per visit from the compromised server and the moment a code change is made, it is active in victim browsers.</p>
<p>This is different from application supply chain attacks or WordPress plugin supply chain attacks. An application supply chain attack needs a compromised application to be distributed before it exploits users. Desktop or mobile users need to upgrade to the new version before they are effected. Even if an auto-update is pushed out by the attacker somehow, there will be some delay before it is effective.</p>
<p>A WordPress plugin supply chain attack needs site owners to update to the new compromised plugin version before it is active. Javascript supply chain attacks are instantly active and being loaded by site visitors as soon as the attacker saves the file to the distribution web server. That is why it is critically important to use SRI for all external scripts on your site.</p>
<p>Please spread the word about the risk of Javascript supply chain attacks and how to mitigate them using Subresource Integrity or SRI.</p>
<div class="fm_social_share">
<p><strong>Did you enjoy this post? Share it!</strong></p>
</div>

		</div>
	</div>
</div></div></div></div>
</div><p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&#038;title=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" data-a2a-url="https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/" data-a2a-title="Crypto-Mining Supply Chain Attack Hits UK Gov’t websites"></a></p><p>The post <a href="https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/">Crypto-Mining Supply Chain Attack Hits UK Gov&#8217;t websites</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>8 Reasons to Switch from Windows 10 to Linux</title>
		<link>https://cvtfstudios.net/8-reasons-switch-windows-10-linux/</link>
					<comments>https://cvtfstudios.net/8-reasons-switch-windows-10-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 20 Mar 2016 14:02:27 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Switch to Linux]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3331</guid>

					<description><![CDATA[<p>Derrik Diener 9th Jan 2016 Linux, Windows 150 Comments Windows 10 has been out in the wild for a while now. For the most part, people have been really liking it. It’s probably the most streamlined version of Microsoft’s operating system to date. Still, some people aren’t happy with the upgrade and are looking at  [...]</p>
<p>The post <a href="https://cvtfstudios.net/8-reasons-switch-windows-10-linux/">8 Reasons to Switch from Windows 10 to Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<header class="entry-header"><img decoding="async" class="aligncenter  wp-image-70757" src="https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux.jpeg" alt="" width="812" height="382" srcset="https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-200x94.jpeg 200w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-300x141.jpeg 300w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-400x188.jpeg 400w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-500x235.jpeg 500w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux-600x282.jpeg 600w, https://cvtfstudios.net/wp-content/uploads/2016/03/Switch-from-windoze-to-Linux.jpeg 693w" sizes="(max-width: 812px) 100vw, 812px" /></p>
<h6 class="entry-meta"><span class="entry-meta-content"><i class="icon-user"></i> <span class="entry-author"><a class="entry-author-link" href="https://www.maketecheasier.com/author/derrikdiener/" rel="author"><span class="entry-author-name">Derrik Diener</span></a></span></span> <span class="entry-meta-content"><i class="icon-calendar"></i> 9th Jan 2016</span> <span class="entry-meta-content hidden-phone"><i class="icon-tag"></i> <a href="https://www.maketecheasier.com/category/linux-tips/">Linux</a>, <a href="https://www.maketecheasier.com/category/windows-tips/">Windows</a></span> <span class="entry-meta-content hidden-phone"><i class="icon-bubble"></i> <span class="entry-comments-link"> <a href="https://www.maketecheasier.com/switch-windows-10-to-linux/#comments">150 Comments</a></span></span></h6>
</header>
<div id="sharebar" class="">Windows 10 has been out in the wild for a while now. For the most part, people have been really liking it. It’s probably the most streamlined version of Microsoft’s operating system to date. Still, some people aren’t happy with the upgrade and are looking at alternatives.</div>
<div class="entry-content">
<div id="MTE_in_content_ad"></div>
<p>Introducing Linux: it’s a free and open source platform which many operating systems are built upon. If you’re looking to move from Windows to an alternative, here are eight compelling reasons why you should leave Microsoft for a more free and open source operating system.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&amp;linkname=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2F8-reasons-switch-windows-10-linux%2F&#038;title=8%20Reasons%20to%20Switch%20from%20Windows%2010%20to%20Linux" data-a2a-url="https://cvtfstudios.net/8-reasons-switch-windows-10-linux/" data-a2a-title="8 Reasons to Switch from Windows 10 to Linux"></a></p><p>The post <a href="https://cvtfstudios.net/8-reasons-switch-windows-10-linux/">8 Reasons to Switch from Windows 10 to Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/8-reasons-switch-windows-10-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Review post with sidebar</title>
		<link>https://cvtfstudios.net/review-post-with-sidebar/</link>
					<comments>https://cvtfstudios.net/review-post-with-sidebar/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 06 Oct 2014 14:11:10 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1843</guid>

					<description><![CDATA[<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. At enim, qua in vita est aliquid mali, ea beata esse non potest. Quis est, qui non oderit libidinosam, protervam adolescentiam? Non est igitur voluptas bonum. Duo Reges: constructio interrete. Non est ista, inquam, Piso, magna dissensio. Cum autem venissemus in Academiae non sine causa nobilitata spatia,  [...]</p>
<p>The post <a href="https://cvtfstudios.net/review-post-with-sidebar/">Review post with sidebar</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. At enim, qua in vita est aliquid mali, ea beata esse non potest. Quis est, qui non oderit libidinosam, protervam adolescentiam? Non est igitur voluptas bonum. Duo Reges: constructio interrete. Non est ista, inquam, Piso, magna dissensio. Cum autem venissemus in Academiae non sine causa nobilitata spatia, solitudo erat ea, quam volueramus. Vitae autem degendae ratio maxime quidem illis placuit quieta. Aliter homines, aliter philosophos loqui putas oportere? Amicitiam autem adhibendam esse censent, quia sit ex eo genere, quae prosunt. Audax negotium, dicerem impudens, nisi hoc institutum postea translatum ad philosophos nostros esset.</p>
<p>Illa sunt similia: hebes acies est cuipiam oculorum, corpore alius senescit; Mihi quidem Antiochum, quem audis, satis belle videris attendere. Quamquam tu hanc copiosiorem etiam soles dicere. Isto modo ne improbos quidem, si essent boni viri. Ea possunt paria non esse. At multis se probavit. Collatio igitur ista te nihil iuvat.</p>
<ul>
<li>Qua tu etiam inprudens utebare non numquam.</li>
<li>Miserum hominem! Si dolor summum malum est, dici aliter non potest.</li>
<li>Quo modo autem optimum, si bonum praeterea nullum est?</li>
<li>Hanc ergo intuens debet institutum illud quasi signum absolvere.</li>
<li>Expressa vero in iis aetatibus, quae iam confirmatae sunt.</li>
</ul>
<p>Invidiosum nomen est, infame, suspectum. Sequitur disserendi ratio cognitioque naturae; Itaque nostrum est-quod nostrum dico, artis est-ad ea principia, quae accepimus. Scio enim esse quosdam, qui quavis lingua philosophari possint; Tecum optime, deinde etiam cum mediocri amico. Tum Triarius: Posthac quidem, inquit, audacius. Quae si potest singula consolando levare, universa quo modo sustinebit?</p>
<p>Odium autem et invidiam facile vitabis. Nondum autem explanatum satis, erat, quid maxime natura vellet. Ab his oratores, ab his imperatores ac rerum publicarum principes extiterunt. Aliter autem vobis placet. Ut nemo dubitet, eorum omnia officia quo spectare, quid sequi, quid fugere debeant?</p>
<p>Non igitur bene. Non semper, inquam; Tum Triarius: Posthac quidem, inquit, audacius.</p>
<ol>
<li>Quis istud possit, inquit, negare?</li>
<li>Hoc non est positum in nostra actione.</li>
<li>Quamquam id quidem, infinitum est in hac urbe;</li>
<li>Quo plebiscito decreta a senatu est consuli quaestio Cn.</li>
</ol>
<blockquote cite="https://loripsum.net"><p>Hunc ipsum Zenonis aiunt esse finem declarantem illud, quod a te dictum est, convenienter naturae vivere.</p></blockquote>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Freview-post-with-sidebar%2F&amp;linkname=Review%20post%20with%20sidebar" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Freview-post-with-sidebar%2F&amp;linkname=Review%20post%20with%20sidebar" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Freview-post-with-sidebar%2F&amp;linkname=Review%20post%20with%20sidebar" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Freview-post-with-sidebar%2F&amp;linkname=Review%20post%20with%20sidebar" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Freview-post-with-sidebar%2F&amp;linkname=Review%20post%20with%20sidebar" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Freview-post-with-sidebar%2F&amp;linkname=Review%20post%20with%20sidebar" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Freview-post-with-sidebar%2F&#038;title=Review%20post%20with%20sidebar" data-a2a-url="https://cvtfstudios.net/review-post-with-sidebar/" data-a2a-title="Review post with sidebar"></a></p><p>The post <a href="https://cvtfstudios.net/review-post-with-sidebar/">Review post with sidebar</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/review-post-with-sidebar/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
