<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Website security Archives - Tarheel Media Digital Marketing</title>
	<atom:link href="https://tarheel.media/tag/website-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://tarheel.media/tag/website-security/</link>
	<description>Digital Marketing The Right Way</description>
	<lastBuildDate>Wed, 29 Oct 2025 22:05:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://tarheel.media/wp-content/uploads/2022/12/cropped-tarheel-icon-1-32x32.png</url>
	<title>Website security Archives - Tarheel Media Digital Marketing</title>
	<link>https://tarheel.media/tag/website-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Important Update: Let&#8217;s Encrypt SSL Certificate Changes Affecting Device Compatibility</title>
		<link>https://tarheel.media/company-news/2024/03/15/important-update-lets-encrypt-ssl-certificate-changes-affecting-device-compatibility/</link>
		
		<dc:creator><![CDATA[Mike W.]]></dc:creator>
		<pubDate>Sat, 16 Mar 2024 01:23:38 +0000</pubDate>
				<category><![CDATA[Company News]]></category>
		<category><![CDATA[Security Bulletin]]></category>
		<category><![CDATA[Service Updates]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Development]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Android devices]]></category>
		<category><![CDATA[compatibility]]></category>
		<category><![CDATA[device compatibility]]></category>
		<category><![CDATA[digital security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[IdenTrust DST Root CA X3]]></category>
		<category><![CDATA[ISRG Root X1]]></category>
		<category><![CDATA[Let's Encrypt]]></category>
		<category><![CDATA[online trust]]></category>
		<category><![CDATA[SSL certificate]]></category>
		<category><![CDATA[Tarheel Media]]></category>
		<category><![CDATA[web development]]></category>
		<category><![CDATA[web hosting]]></category>
		<category><![CDATA[Website security]]></category>
		<category><![CDATA[wellsm]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=3995</guid>

					<description><![CDATA[<p>At Tarheel Media, we prioritize the security and functionality of your websites. That's why we're reaching out to inform you of an upcoming change that could impact the compatibility of Let's Encrypt SSL certificates with certain devices. Let's Encrypt, a trusted provider of free SSL certificates, has been issuing certificates through two chains: the ISRG  [...]</p>
<p>The post <a href="https://tarheel.media/company-news/2024/03/15/important-update-lets-encrypt-ssl-certificate-changes-affecting-device-compatibility/">Important Update: Let&#8217;s Encrypt SSL Certificate Changes Affecting Device Compatibility</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>At Tarheel Media, we prioritize the security and functionality of your websites. That&#8217;s why we&#8217;re reaching out to inform you of an upcoming change that could impact the compatibility of Let&#8217;s Encrypt SSL certificates with certain devices.</p>
<p>Let&#8217;s Encrypt, a trusted provider of free SSL certificates, has been issuing certificates through two chains: the ISRG Root X1 chain and the ISRG Root X1 chain cross-signed by IdenTrust’s DST Root CA X3. The cross-signed chain has been crucial in ensuring widespread trust for Let&#8217;s Encrypt certificates across various devices.</p>
<p>However, Let&#8217;s Encrypt is now making a vital change that may affect the compatibility of these certificates. Specifically, they are removing the root from the trust store, which could result in older devices &#8211; such as those running Android 7 &#8211; being unable to use or trust these certificates.</p>
<p>This change is significant as it may impact the security and accessibility of websites, especially for users accessing them from devices that rely on the now-unsupported chain. We understand the importance of ensuring seamless browsing experiences for all users, which is why we want to bring this update to your attention.</p>
<p>As your trusted web development partner, we are here to assist you in navigating through these changes. If you have any concerns or questions regarding your SSL certificates and their compatibility, please don&#8217;t hesitate to reach out to us. Our team is dedicated to ensuring that your websites remain secure and functional for all users, regardless of device compatibility challenges.</p>
<p>We appreciate your attention to this matter and your continued trust in Tarheel Media for your web development needs.</p>
<p>The post <a href="https://tarheel.media/company-news/2024/03/15/important-update-lets-encrypt-ssl-certificate-changes-affecting-device-compatibility/">Important Update: Let&#8217;s Encrypt SSL Certificate Changes Affecting Device Compatibility</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Safeguard Your Digital Fortress: The Importance of Website Security</title>
		<link>https://tarheel.media/security-bulletin/2023/05/20/safeguard-your-digital-fortress-the-importance-of-website-security/</link>
		
		<dc:creator><![CDATA[Michael Gilmore]]></dc:creator>
		<pubDate>Sat, 20 May 2023 09:32:57 +0000</pubDate>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security Bulletin]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Tips & Tricks]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber threats]]></category>
		<category><![CDATA[Cybersecurity measures]]></category>
		<category><![CDATA[Data breaches]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[Digital protection]]></category>
		<category><![CDATA[Downtime prevention]]></category>
		<category><![CDATA[Fortifying your website]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Malware protection]]></category>
		<category><![CDATA[Proactive security]]></category>
		<category><![CDATA[User trust]]></category>
		<category><![CDATA[Website security]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=3324</guid>

					<description><![CDATA[<p>In today's digital landscape, where businesses heavily rely on their online presence, website security has become paramount. The rise in cyber threats and the ever-evolving tactics of hackers underscore the importance of safeguarding your digital fortress. In this blog post, we'll explore why website security is crucial and shed light on why hackers relentlessly target  [...]</p>
<p>The post <a href="https://tarheel.media/security-bulletin/2023/05/20/safeguard-your-digital-fortress-the-importance-of-website-security/">Safeguard Your Digital Fortress: The Importance of Website Security</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s digital landscape, where businesses heavily rely on their online presence, website security has become paramount. The rise in cyber threats and the ever-evolving tactics of hackers underscore the importance of safeguarding your digital fortress. In this blog post, we&#8217;ll explore why website security is crucial and shed light on why hackers relentlessly target websites.</p>
<h2>Protecting Your Valuable Assets</h2>
<p>Your website is more than just a virtual storefront; it&#8217;s a hub of valuable assets. From customer data and financial information to proprietary business secrets, your website holds sensitive data that can be a goldmine for hackers. Implementing robust security measures ensures the protection of these valuable assets and safeguards your business&#8217;s reputation.</p>
<h2>Preserving User Trust</h2>
<p>Customers expect their online interactions to be secure and their information to be handled responsibly. A security breach can severely damage the trust your users have placed in your business. By prioritizing website security, you demonstrate your commitment to safeguarding their data, fostering trust, and encouraging continued engagement.</p>
<h2>Avoiding Costly Downtime</h2>
<p>A compromised website can lead to prolonged downtime, which translates into lost revenue, missed opportunities, and dissatisfied customers. Hackers may exploit vulnerabilities to disrupt your website&#8217;s functionality or install malicious code that disrupts operations. Proactive security measures help minimize the risk of such incidents, ensuring uninterrupted business continuity.</p>
<h2>Preventing Data Breaches</h2>
<p>Data breaches have become an all-too-common occurrence, with severe consequences for businesses. Hackers exploit vulnerabilities to gain unauthorized access to databases, compromising sensitive customer information. Such breaches can result in legal consequences, financial penalties, and irreparable damage to your brand&#8217;s reputation. Robust security protocols act as a shield against data breaches, reducing the risk of costly fallout.</p>
<h2>Thwarting Malicious Intent</h2>
<p>Hackers have various motivations for targeting websites, ranging from financial gain to political activism or simply causing chaos. They may inject malware, deface webpages, or steal sensitive information for their nefarious purposes. By bolstering your website security, you actively thwart their attempts and create a formidable barrier against malicious intent.</p>
<h2>Staying One Step Ahead</h2>
<p>Cyber threats are constantly evolving, with hackers employing sophisticated techniques to breach security defenses. Regularly updating and maintaining your website&#8217;s security protocols allows you to stay one step ahead of potential threats. By keeping pace with the latest security standards, you ensure your website remains resilient against emerging vulnerabilities.</p>
<h3>Conclusion</h3>
<p>Investing in website security is not an option but a necessity in today&#8217;s digital landscape. By prioritizing security, you protect your valuable assets, preserve user trust, avoid costly downtime, prevent data breaches, and thwart malicious intent. Stay proactive, leverage robust security measures, and work with experienced professionals to fortify your digital fortress against ever-present threats. Remember, safeguarding your website is an ongoing commitment that helps safeguard your business&#8217;s future.</p>
<p>The post <a href="https://tarheel.media/security-bulletin/2023/05/20/safeguard-your-digital-fortress-the-importance-of-website-security/">Safeguard Your Digital Fortress: The Importance of Website Security</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Outdated WordPress Plugins make 60,000 Websites Vulnerable</title>
		<link>https://tarheel.media/security-bulletin/2023/05/17/outdated-wordpress-plugins-make-60000-websites-vulnerable/</link>
		
		<dc:creator><![CDATA[Michael Gilmore]]></dc:creator>
		<pubDate>Wed, 17 May 2023 18:27:20 +0000</pubDate>
				<category><![CDATA[Security Bulletin]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitable plugins]]></category>
		<category><![CDATA[Information system security]]></category>
		<category><![CDATA[Penetration testing]]></category>
		<category><![CDATA[Plugin vulnerabilities]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security disclosure process]]></category>
		<category><![CDATA[Security research]]></category>
		<category><![CDATA[SQL injections]]></category>
		<category><![CDATA[Unauthorized access]]></category>
		<category><![CDATA[Vulnerable websites]]></category>
		<category><![CDATA[Website hijacking]]></category>
		<category><![CDATA[Website intrusions]]></category>
		<category><![CDATA[Website maintenance]]></category>
		<category><![CDATA[Website protection]]></category>
		<category><![CDATA[Website security]]></category>
		<category><![CDATA[Website updates]]></category>
		<category><![CDATA[Website vulnerabilities]]></category>
		<category><![CDATA[WordPress database]]></category>
		<category><![CDATA[WordPress security]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=3160</guid>

					<description><![CDATA[<p>The security firm, Cyllective, identified around 5,000 plugins on WordPress.org that contained various security exploits such as SQL Injections. The Penetration Testing Team lead, Dave Miller said what started as a random experiment turned into a treasure trove for hackers. Once they started the experiment, they were quickly surprised at how relaxed the security was  [...]</p>
<p>The post <a href="https://tarheel.media/security-bulletin/2023/05/17/outdated-wordpress-plugins-make-60000-websites-vulnerable/">Outdated WordPress Plugins make 60,000 Websites Vulnerable</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The security firm, Cyllective, identified around 5,000 plugins on WordPress.org that contained various security exploits such as SQL Injections. The Penetration Testing Team lead, Dave Miller said what started as a random experiment turned into a treasure trove for hackers. Once they started the experiment, they were quickly surprised at how relaxed the security was on WordPress.org&#8217;s repository in allowing old and exploitable plugins to remain and be installed.</p>
<p>If that wasn&#8217;t bad enough, Dave&#8217;s team came across remote code execution vulnerabilities or RCE&#8217;s. RCE&#8217;s are usually where bad code allows an attacker to gain administrative or super-user privileges and entirely take over a website or the entire information system.</p>
<p>Dave&#8217;s team, however, focused in on the SQL injections &#8211; a way of appending your own SQL query from code that does not escape its <span style="color: #008080;">$_POST</span> variables which is the variable where the stuff you submit to a website is stored. After just 3 months of research, Dave&#8217;s team found a staggering 35 plugins that had already been exploited by unauthorized users or hackers. While 35 sounds like a low number, those 35 plugins were in operation and were exploited on over 60,500 WordPress websites.</p>
<p>&#8220;Although the vast majority of the vulnerabilities I reported were unauthenticated SQL injection vulnerabilities, which would have enabled an attacker to dump the entire WordPress database contents, these were not the most devastating ones,” Dave said.</p>
<p>“The sitemap-by-click5 plugin suffered from an unauthenticated arbitrary options update flaw, which would have allowed an attacker to maliciously enable the registration functionality and set the default user role to that of an administrator.&#8221;</p>
<p>Dave explained that this would allow an attacker to create their own administrator account and entirely take over the WordPress website. Dave went on to say that he hopes this research forwards the ability to quickly identify security exploits in the future and minimize website intrusions.</p>
<p>After dealing with these WordPress Plugins and WordPress.org a pretty heavy blow, Dave did applaud the WordPress team for how well the disclosure process went in allowing Dave&#8217;s team to reach out and get these updates out there to these vulnerable websites that desperately needed it.</p>
<p>The post <a href="https://tarheel.media/security-bulletin/2023/05/17/outdated-wordpress-plugins-make-60000-websites-vulnerable/">Outdated WordPress Plugins make 60,000 Websites Vulnerable</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
