Posted by: Jessica Scarpati
Recently, a security professional asked our application security
expert, Michael Cobb, “How are phishers using search engines like
Google to seek out and hack vulnerable PHP applications? What can be
done to protect those apps?”
As part of his monthly responses to readers, Cobb explains how to
keep phishers from finding your exposed servers and using them to
stash stolen data.