123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Wordpress 3.1.4 Addresses Security Flaws

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, WordPress Development team released WordPress 3.1.4 and the release candidate 3 for WordPress 3.2. The company had earlier planned to release WordPress 3.2 by the end of June. WordPress 3.1.4 addresses an issue, which could allow users at editor-level to gain additional access to the site. Developers have also resolved several other security issues and integrated several hardening measures to strengthen the platform. Millions of websites worldwide including major media sites use the online blogging and publishing platform. WordPress, which started as a blogging tool has steadily evolved as a content management system. The WordPress.org and WordPress.com have also faced several security issues in the recent times. Recently, WordPress alerted users that attackers had modified plugins such as AddThis, WPtouch, and W3 Total Cache to include backdoors in them. Security professionals were successful in updating the affected plugins. WordPress.com, which remains unaffected with plugin incident, suffered distributed denial-of-service attack earlier in the year.

The release candidate 3 for WordPress 3.2 incorporates ...
... fixes for all vulnerabilities addressed in 3.1.4, mitigates minor RTL JavaScript issues, and includes fixes for user interface. Developers have urged users to test the release candidate on a non-live test site, and communicate issues and bugs to the WordPress development team. The minimum requirements for version 3.2 now stand at PHP 5.2.4 and MySQL 5.0.

Millions of users use various WordPress based platforms. As such, there always remains threat of compromise of user accounts. Organizations using WordPress platform must immediately to the latest version to avoid exploitation of security flaws. Operational issues and lack of prioritization often result in delays in implementing security updates. Cybercriminals take advantage of the time lag in issue of an update and implementation by end-users to exploit security flaws. Professionals qualified in masters of security science and computer science degree may enable organizations to identify and prioritize security updates and patches.

The vibrant and ever-evolving security threats pose challenge for both developers and end-users. While developers must constantly strive to detect and resolve security issues, end-users must have appropriate policies and procedures in place to deal with security challenges. Organizations must train employees on cyber security practices and incident management. Employees may take advantage of online degree and e-learning programs to enhance their security awareness.

Participation in security conferences, and undertaking online university degree programs and security certifications may help security professionals in staying abreast of latest happenings in security industry and enhancing their technical expertise.

Total Views: 258Word Count: 406See All articles From Author

Add Comment

Computers Articles

1. Martindale Law Firm Competitive Analysis Data For Legal Industry
Author: Den Rediant

2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates

3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors

4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen

5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns

6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs

7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant

8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant

9. Answering_services
Author: brainbell10

10. Api_security
Author: brainbell10

11. Appium
Author: brainbell10

12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant

13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant

14. Adobe_xd
Author: brainbell

15. Amazon Sagemaker Services
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: