If anyone has any concerns about a plugin they can ask at
the http://wordpress.org/support/ forums and
they can also email plugins@wordpress.org If you email please be
specific as to what you have seen and why it is causing concern.
The plugin will then be installed, checked and read to establish
any issues.
Thanks for this article. I didn’t realize that the plug-in repository was not scanned in the same way that the theme repository is. The next plug-in I add will be the Exploit plug-in referenced above.
Very happy that I came across this post.
There are a few blogs that I have been having issues with and now I believe a few of the plug ins may be the problem.
Never knew about the Exploit Scanner plug in.
Appreciate this information very much.
Thanks
That was a great, quick read that included some critically important points:
The WordPress Plugin Directory is undoubtedly the best on-stop shop for any of our plugin needs. I have a few favorite developers that I follow, but I also know that their latest releases are sure to be found on the directory. And with the stats that help me make a decision on whether or not to install a plugin I am interested in.
The vulnerability of our sites to malware delivered through a plugin installation really is something to be taken seriously. I liked the fact you highlighted the need for a strict regimen of security checks each time a plugin is considered for installation.
Exploit Scanner Plugin. What a great tool. For me, it is just a matter of getting into the discipline of using it each and every time a new plugin is introduced to my site or to a client’s site. I know many of us just “hit the install button” because of the presumption of security that comes with things we get from the WordPress site.
As far as questions for furthering your FAQ series: You mentioned that our website visitors might be subject to invasive scripts associated with malware – any thoughts, advice, symptoms or other education you care to pass along would be much appreciated!
James began using WordPress in 2004. Being new to WordPress (and blogging in general), he quickly found the WordPress Support Forums and basically never left. James currently resides in sunny Southern California, where he enjoys bringing happiness to millions of WordPress.com users.
If anyone has any concerns about a plugin they can ask at
the http://wordpress.org/support/ forums and
they can also email plugins@wordpress.org If you email please be
specific as to what you have seen and why it is causing concern.
The plugin will then be installed, checked and read to establish
any issues.
Thanks for this article. I didn’t realize that the plug-in repository was not scanned in the same way that the theme repository is. The next plug-in I add will be the Exploit plug-in referenced above.
Very happy that I came across this post.
There are a few blogs that I have been having issues with and now I believe a few of the plug ins may be the problem.
Never knew about the Exploit Scanner plug in.
Appreciate this information very much.
Thanks
That was a great, quick read that included some critically important points:
The WordPress Plugin Directory is undoubtedly the best on-stop shop for any of our plugin needs. I have a few favorite developers that I follow, but I also know that their latest releases are sure to be found on the directory. And with the stats that help me make a decision on whether or not to install a plugin I am interested in.
The vulnerability of our sites to malware delivered through a plugin installation really is something to be taken seriously. I liked the fact you highlighted the need for a strict regimen of security checks each time a plugin is considered for installation.
Exploit Scanner Plugin. What a great tool. For me, it is just a matter of getting into the discipline of using it each and every time a new plugin is introduced to my site or to a client’s site. I know many of us just “hit the install button” because of the presumption of security that comes with things we get from the WordPress site.
As far as questions for furthering your FAQ series: You mentioned that our website visitors might be subject to invasive scripts associated with malware – any thoughts, advice, symptoms or other education you care to pass along would be much appreciated!
Thanks for writing a great, useful piece.