Category Archives: Magento Security

Magento bugs and fixesMagento CDNMagento designMagento ExtensionsMagento SecuritySpeed up Magento
Blank Image

Upgrade from Magento 1 to Magento 2

The time has come to upgrade your Magento 1.9 website.   Your Magento 1.9.x.x sites are already vulnerable to hackers, delaying will only leave you more exposed once the June 2020 deadline has passed. Migrating your Magento site is more than possible, every site is different and therefore we need to speak with you to […]...
HostingMagento bugs and fixesMagento Security
Blank Image

Problems with spam posts in phpBB3, wordpress or any site using .htaccess.

Recently we were plagued by Bots from China creating posts in a phpbb3 board and several wordpress websites. After spending time researching how to block them we discovered this little gem. If your website uses a .htaccess file in the root then add the following code to it to ban several countries from even seeing […]...
Magento Security
Blank Image

Monitor your admin access Magento

      A nice way to see if you have any unwanted visitors to your admin access in Magento is to add Google analytics to the login page. To do this all you need to do is go to /httpdocs/app/design/adminhtml/default/default/template/Login.phtml then copy your GA code into the Head of the page like this <head> […]...
Magento Security
Blank Image

How to change your site_admin login url Magento

When you install Magento the admin access directory is set to site_admin. This makes it very easy for a hacker to find the admin access area. To change this to make it more difficult navigate to /app/etc using your favorite ftp program or your access panel. Then download local.xml. Open local.xml in a text editor […]...
Magento Security
Blank Image

Magento Zend Framework security issue

Recently a serious vulnerability in the Zend Framework on which Magento is built was spotted. This note provides information on how you can access and install a patch that solves this issue. The Issue The vulnerability potentially allows an attacker to read any file on the web server where the Zend XMLRPC functionality is enabled. […]...