Security Awareness Expert On New E-skimmer Discovered On WordPress Site Utilizing WooCommerce Plugin

In response to a new report that indicates credit card thieves are targeting WordPress e-commerce sites powered by WooCommerce with a dedicated JavaScript-based card-skimmer malware, a security awareness expert offers perspective.

Subscribe
Notify of
guest
1 Expert Comment
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
James McQuiggan
James McQuiggan , Security Awareness Advocate
InfoSec Expert
April 14, 2020 11:44 am

Third-party plugins are always a high-value target for criminals, as it\’s an easy way to access hundreds to thousands of sites through manipulating the code at the source where the plugin is developed. Organizations want to make sure they educate and train their developers to analyze and verify all third-party plugins for unusual activity through the quality and analysis testing process before releasing new updates.

The website is an organization\’s \”front door\” to the world, and if they don\’t keep their home secure, they risk someone breaking into their home and stealing valuables. Like a home, the website must be secured, and one easy way is to verify the plugins and software regularly. Failure to do so can lead to hackers quickly gaining access to the site and stealing data or defacing the site. While the plugin may be well accepted, if it\’s not inspected and verified, the risk of doing so can lead to a data breach and damage to reputation.

Last edited 2 years ago by James McQuiggan
Information Security Buzz
1
0
Would love your thoughts, please comment.x
()
x