<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; Serversaurus Blog</title>
	<atom:link href="https://blog.serversaurus.com.au/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.serversaurus.com.au</link>
	<description></description>
	<lastBuildDate>Thu, 09 Jan 2020 05:26:54 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.3.2</generator>

<image>
	<url>https://blog.serversaurus.com.au/wp-content/uploads/2017/12/SS_LOGO_2017_copy-150x150.png</url>
	<title>Security &#8211; Serversaurus Blog</title>
	<link>https://blog.serversaurus.com.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Vulnerabilities discovered in WordPress 5.3</title>
		<link>https://blog.serversaurus.com.au/vulnerabilities-discovered-in-wordpress-distributions-5-3/</link>
				<pubDate>Thu, 09 Jan 2020 03:39:43 +0000</pubDate>
		<dc:creator><![CDATA[mackenzie]]></dc:creator>
				<category><![CDATA[Operations]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Tips & Tricks]]></category>

		<guid isPermaLink="false">https://blog.serversaurus.com.au/?p=706</guid>
				<description><![CDATA[Several vulnerabilities have been discovered in WordPress distributions up to version 5.3. The vulnerabilities discovered allow remote attackers being able to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create open redirects, poison cache, and bypass authorization access and input sanitation. These vulnerabilities have been addressed and resolved in the latest WordPress version 5.3.1+. Our team would&#46;&#46;&#46;]]></description>
								<content:encoded><![CDATA[
<p>Several vulnerabilities have been discovered in WordPress distributions up to version 5.3. </p>



<p>The vulnerabilities discovered allow remote attackers being able to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create open redirects, poison cache, and bypass authorization access and input sanitation.</p>



<p>These vulnerabilities have been addressed and resolved in the latest WordPress version 5.3.1+.</p>



<p>Our team would like to kindly encourage our clients to update their WordPress installations to the latest, secure version to protect your website any of the mentioned attacks. </p>



<p>Additionally please consider reading our <a href="https://support.serversaurus.com.au/hc/en-us/articles/360000922576-Basic-WordPress-security-and-site-management">WordPress security guide</a> for further recommendations to secure your WordPress website.</p>



<p>If you don&#8217;t update your WordPress version, and unfortunately your website is compromised by one of the above attacks, you may find this article helpful&#8230; <a href="https://support.serversaurus.com.au/hc/en-us/articles/360001112956-How-did-my-WordPress-website-get-hacked-What-do-I-do-">&#8220;How did my WordPress website get hacked? What do I do?&#8221;</a></p>
]]></content:encoded>
										</item>
		<item>
		<title>Raining on our parade</title>
		<link>https://blog.serversaurus.com.au/raining-on-our-parade/</link>
				<pubDate>Tue, 10 May 2011 01:12:58 +0000</pubDate>
		<dc:creator><![CDATA[Nick]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://dev.dynomesh.com.au/?p=317</guid>
				<description><![CDATA[Why security concerns are paralysing the growth of cloud computing and deterring businesses from transitioning into ‘the cloud’. The introduction of the Internet into society essentially resulted in the inability to protect information by practical obscurity. For many, the digital sphere represents a loss of individual control of information and a threat to personal privacy. It is this inherent fear&#46;&#46;&#46;]]></description>
								<content:encoded><![CDATA[<p><em>Why security concerns are paralysing the growth of cloud computing and deterring businesses from transitioning into ‘the cloud’.</em></p>
<p>The introduction of the Internet into society essentially resulted in the inability to protect information by practical obscurity. For many, the digital sphere represents a loss of individual control of information and a threat to personal privacy. It is this inherent fear of relinquishing ownership that IT analysts and cloud organizations attribute to the stunted growth of virtual infrastructure technology, often referred to by the term ‘cloud computing’.</p>
<p>At its core, the cloud offers an alternative to private networks and private managed infrastructure, by offering elasticity, scalability, and the cost benefits of a utility based pricing model in a secure virtual environment.</p>
<p>The uniqueness of security in cloud computing can be attributed at its most primitive level to both the provider and the customer. Both of these parties have the responsibility of ensuring security and integrity of deployed virtual infrastructure in the cloud. </p>
<p>Quintessentially, the provider (that’s us), has the arduous task of ensuring the security of our infrastructure, as well as protecting your data, application &#038; OS level. As the customer however, there must also be an awareness of responsibility to demand transparency from distributors and partners, in terms of what occurs in this virtualised environment, and additionally who has access to their cloud machines.</p>
<p>It is due to these concerns that some businesses are reluctant to pursue cloud computing as a viable option. Herein lies the insurmountable problem of developing an effective cloud marketing strategy, able to defuse some of these concerns to the public. The process of developing and offering trust, security and control is integral to the cloud’s success.</p>
<p>Due to this perception of risk, businesses should not instantly shy away from the concept of cloud computing, but rather carry out effective risk management and value analysis instead. Of course, as with everything, from catching the bus to work in the morning, to deploying a scalable Ruby application, there are risks involved, and we need to weigh them up and factor this into our decision making.</p>
<p><a href="http://www.youtube.com/watch?v=VjfaCoA2sQk" target="_new" rel="noopener noreferrer">Here&#8217;s a light-hearted look at the issue of security in the cloud.</a> </p>
<p>In our next blog post we’ll be discussing the concepts and additional security benefits of a private cloud.</p>
]]></content:encoded>
										</item>
	</channel>
</rss>
