Skip to content

Sorin Mustaca on Cybersecurity

Thoughts on Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC

  • Security
    • IT Security News English
    • IT Sicherheit News Deutsch
    • Securitate in limba Romana
    • Tipps und Ratschläge – IT Sicherheit
  • News
    • In the news
    • Quoted
  • About
    • About me
    • Contact
    • “Improve your security” free eBook
    • Scuba Diving Blog
  • Privacy Policy
  • Cyber Security Consulting
  • Automotive Cybersecurity
  • Home
  • General
  • The importance of user names in Wordpress

The importance of user names in WordPress

November 4, 2021

I have a plugin that prevents multiple unsuccessful logins.

As can be seen, the spammers try several combinations like: admin (the default), then site name, and several others.

It is critical to create a user name that is different than the obvious names, especially the default username “admin”.

Another interesting thing is that I get both IPv4 as well as IPv6 IP addresses. More and more IPv6.

Also, a spammer will continuously try to hack you, because they have automated scripts.

So, it makes sense to block them for a longer time.

 

For example, I use these settings:

 

The plugin I am using is “Limit Login Attempts Reloaded”.

I am not affiliated with them in any way.

 

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...

Related

General SecurityTagged: attempt, block, hack, login

Post navigation

BSI: Die Lage der IT-Sicherheit in Deutschland (German)
ENISA: ADVANCING SOFTWARE SECURITY IN THE EU

Related Posts

Improve your security #10: Make backups

It is said that three things are certain in life: we are born, we pay taxes and we die. Adding a little bit of IT facts on top of this, I can add a fourth certain thing: hardware fails. It is only a question of when and not if it fails. And when it fails, you want […]

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Avira Techblog: Back-to-School tips for online safety

Now that kids are heading back to school, it’s important for parents to understand the online safety and privacy issues that might arise during this busy time of year. A new school year brings new friends and new assignments. Both of these are likely to make kids spend more time online, whether they are communicating […]

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Security updates from Adobe, Mozilla, Microsoft, NVIDIA, Asterisk

The year is starting with a lot of pressure for  Adobe, Mozilla, Microsoft, NVIDIA and Asterisk which had to push security updates to fix several critical security vulnerabilities.   Microsoft has released their monthly patch containing seven bulletins  which close 12 security problems rating as Critical and Important. All versions of Windows are affected, including Windows 8 […]

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on X (Opens in new window) X
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • More
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket

Like this:

Like Loading...
Sorin Mustaca on Twitter Sorin Mustaca on Facebook View Sorin Mustaca's profile on LinkedIn Sorin Mustaca on XING
Subscribe to me on Substack

Categories

My company

Endpoint Cybersecurity

www.endpoint-cybersecurity.com

- Consulting in building your security products
- Android and IOS security software
- Pentests and Security tests for applications
- Cybersecurity Management Systems for Automotive(CSMS, ISO 21434, WP.29, ISO 16949)
- Support in TISAX audits
- Support in NIS2 audits

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 148 other subscribers

My free Ebook

Top Posts & Pages

  • Implementing ISO 27001:2022 Annex A.18 - Compliance
  • Sign files unattended in batch mode while having an eToken (no password popup!) (updated)
  • Defender Application Control or Defender SmartScreen - what can you do to not be blocked by it
  • NIS2: 1. Perform a gap analysis
  • TISAX: new Catalogue ISA v6 available
  • Understanding ISO 27001:2022 Annex A.8 - Asset Management
  • Understanding ISO 27001:2022 Annex A.14 - System Acquisition, Development, and Maintenance
  • How to implement an Information Security Management System (ISMS)
  • Implementing ISO 27001:2022 Annex A.16 - Information Security Incident Management

Links

"Improve your security" - free eBook
IT Security News
Deutsche Version IT Security News
Endpoint Cybersecurity GmbH
Chat GPT

Pages

  • About
  • Apps
  • Contact
  • Cybersecurity and AI Collection
  • Download the free eBook
  • In the news
  • ISO 27001:2022 Collection
  • NIS2 Collection
  • Privacy Policy
  • Securitate in limba Romana
  • Stupid spams or maybe created for a different target
  • Tipps und Ratschläge – IT Sicherheit
RSS IT Security News (EN)
  • Finland Accuses Senior Ship Crew Of Undersea Cable Damage
  • Israel-Tied Predatory Sparrow Hackers Are Waging Cyberwar on Iran’s Financial System
  • Ghostwriting Scam
  • Cyberattack in Dubai Compromises Patient Health Records
  • AWS launches new cloud security features
  • AI Now Generates Majority of Spam and Malicious Emails
  • Hackers steal and destroy millions from Iran’s largest crypto exchange
  • Watch out, Veeam fixed a new critical bug in Backup & Replication product
  • CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage
  • Fake bank ads on Instagram scam victims out of money
RSS IT Sicherheitsnews (DE)
  • Ernste IT-Krise: Berlin droht massive Windows-Sicherheitslücke
  • Deal mit Scale AI: Wie sich Meta für 15 Milliarden die KI-Krone erkaufen will
  • IT Sicherheitsnews taegliche Zusammenfassung 2025-06-18 15h : 4 posts
  • Studie zur Cybersicherheit: Unternehmen überschätzen sich
  • Mit Apples EnergyKit zum Öko-Strom: Wie die neue iPhone-Funktion die Umwelt schonen soll
RSS Improve Your Security Ebook
  • Protecting Our Teens: A Guide to Creating Awareness About Online Dangers
  • A Guide to Teaching Online Safety and Navigating Cyber Dangers
  • How to easily secure your smartphone
  • Conclusion: The Ultimate Parent Guide for Protecting Your Child on the Internet
  • Online predators: The Ultimate Parent Guide for Protecting Your Child on the Internet

Copyright © 2000 - 2025 Sorin Mustaca on Cybersecurity | Marvel Blog by Ascendoor | Powered by WordPress.

 

Loading Comments...
 

You must be logged in to post a comment.

    %d