(The Hosting News) – WordPress is reviewing data logs and looking to patch up its security after the site was breached by hackers on Tuesday.
The hackers gained access to the site’s servers. Automatic, the company that runs the popular blogging site determined that the breach was low level. However, the company says there’s still a chance that the site’s source code was copied.
In a statement released on the site’s official blog, WordPress founder Matt Mullenweg noted that while most of the coding on WordPress is open source, there is still sensitive data available. Such data could go a long way in helping hackers’ motives. While it remains unclear what specific information was taken, data access could provide the hackers with premium customers’ passwords for twitter accounts and Facebook. Hackers may have also accessed customers’ API keys.
Premium customers that could be affected include such heavyweights as NASA, Flickr, and Yahoo. Sites that host WordPress on their own servers should not be affected by the breach.
Mullenweg stated, “Our investigation into this matter is ongoing and will take time to complete”. The site also urged premium customers to make their passwords stronger to help combat potential breaches.
The security breach is the latest in a line of attacks that have affected the popular blogging host site. WordPress most recently suffered a security breach last month from a DDoS attack that temporarily brought down its data centers. A different attack occurred in 2009 when hackers gained access by creating secret administrator accounts. WordPress provides hosting to nearly 18 million users.
For the entire statement by WordPress founder Mike Mullenweg, visit: http://en.blog.wordpress.com/2011/04/13/security/
Article Source http://www.thehostingnews.com/hackers-gain-access-to-wordpress-servers-17329.html permits to repubish here
<<<<<<<<<<<<<<<&l
Click Most Updated Discount Coupon Codes & My Personal Web Hosting Recommendations if you are interested in those.
Stay Tuned!
<<<<<<<<<<<<<<<&
