<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pressed Words &#187; TechCrunch</title>
	<atom:link href="http://pressedwords.com/tag/techcrunch/feed/" rel="self" type="application/rss+xml" />
	<link>http://pressedwords.com</link>
	<description>News and commentary about all things WordPress</description>
	<lastBuildDate>Thu, 11 Jun 2009 03:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>TechCrunch: Do as We Say, Not as We Do with WordPress Upgrades</title>
		<link>http://pressedwords.com/techcrunch-on-wordpress-security/</link>
		<comments>http://pressedwords.com/techcrunch-on-wordpress-security/#comments</comments>
		<pubDate>Thu, 12 Jun 2008 08:03:13 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Asides]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TechCrunch]]></category>

		<guid isPermaLink="false">http://pressedwords.com/?p=92</guid>
		<description><![CDATA[A recent TechCrunch post makes it sound as if WordPress security releases are desperately following close on the heels of widespread attacks. The author, Nik Cubrilovic, then seems to suggest that open source applications are particularly at risk: Hackers are taking advantage of the open-source nature of the software to analyze the source code and [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A <a href="http://www.techcrunch.com/2008/06/11/my-blog-was-hacked-is-yours-next-huge-wordpress-security-issues/">recent TechCrunch post makes it sound as if WordPress security releases are desperately following close on the heels of widespread attacks</a>.  The author, Nik Cubrilovic, then seems to suggest that open source applications are particularly at risk:</p>
<blockquote><p>Hackers are taking advantage of the open-source nature of the software to analyze the source code and test it for potential vulnerabilities. It is then left up to developers and users to detect, track down, and then close off the vulnerabilities in the code that attackers are using. The pattern seems to be that when a new hole is found, it is broadly exploited, then developers rush out a patch and a new release.</p></blockquote>
<p>Agreeing with many of his overall points, such as the necessity of making frequent backups and keeping up-to-date, I thought it was interesting to note that the specific sites he mentions do not seem to support the premise that they fell even while diligently being updated.</p>
<p>By checking the source of these sites as cached by various search engines, you can see what version of WordPress they were using recently.  The <a href="http://www.nik.com.au/">first one</a> Cubrilovic mentions was &#8220;hacked&#8221; back in January, when it &#8220;was running the most recent version of WordPress available at the time.&#8221;   Apparently that attack didn&#8217;t inspire its maintainer to keep up with updates, as a cached page shows that as recently as the end of May it was using a version of WordPress, 2.3.3, that was seven weeks outdated.</p>
<p>Cubrilovic also links to another <a href="http://paulhaahr.com/blog/2008-06-01-hacked">compromised site</a>, whose owner admits that he had &#8220;been running an ancient version of WordPress and had meant to upgrade, but it never seemed urgent.&#8221;  At <a href="I was already at the latest, 2.5.1, and still got hit.">another he points out</a>, the owner says &#8220;I was already at the latest, 2.5.1, and still got hit.&#8221; However, a cache search shows that as of June 1 the site was still using version 2.5, five weeks after the 2.5.1 security release, suggesting that the attack came prior to the upgrade.  TechCrunch itself as of three days ago ran a version of WordPress over 10 weeks old.</p>
<p>Cubrilovic makes it sound like a WordPress user has to follow every bit of news about WordPress to stay safe: &#8220;For users of WordPress, backups are essential, as are frequent updates, monitoring your blog usage and tracking the official WordPress blog and other blogs for news of any new security holes.&#8221;  That&#8217;s not bad advice, but keep in mind that since WordPress 2.3 there has been a prominent, automatic reminder to upgrade whenever a new release comes out.  In each of the examples, the users had to ignore week after week this message at the top of their admin screens:</p>
<p><img src="http://pressedwords.com/blog/uploads/2008/06/please_upgrade.jpg" alt="A new version of WordPress is available! Please update now." title="A new version of WordPress is available! Please update now." width="426" height="171" class="alignnone size-full wp-image-93" /></p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/techcrunch-on-wordpress-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using memcached
Database Caching 1/8 queries in 0.003 seconds using memcached
Object Caching 233/246 objects using memcached

 Served from: pressedwords.com @ 2026-04-14 22:10:13 by W3 Total Cache -->