WordPress Plugins Detector - Vulnerability Checker
Free WP Vulnerability CheckerThe tool utilizes the CVE (Common Vulnerabilities and Exposures) database and Top-200 WordPress plugins list to perform an in-depth analysis of a site. Once the plugins and the WordPress version have been identified, a vulnerability search is activated. If vulnerabilities are detected, the user will be notified. If no vulnerabilities are present, the necessary upgrades will be suggested.
Frequently Asked Questions
Websites that display suspicious pop-up ads, have tons of grammatical/spelling mistakes, and misspelled domain names should be avoided. Having an antivirus installed with a safe browsing extension is a good way to avoid visiting dangerous sites.
There are many different kinds of dangerous websites out there.
One common internet scam is “phishing”. These are malicious websites that are designed to look identical to popular sites like Facebook or Twitter or even your online banking portal. When you go to input your login information, you’re actually inputting your information into the hacker’s website (not the website you were trying to visit), so the hacker now has your login details.
Other dangerous sites have “drive-by downloads” which means that simply looking at a website or clicking a pop-up window can trigger a malware download. Hackers can then steal your private information or even gain complete access to your computer without you even knowing.
And then there are websites that look very dangerous — they make loud noises and flash text that says your computer is infected with malware and you need to call a certain number to fix the problem. BUT THESE ARE ALWAYS SCAMS! Just close your browser and the popup notification will go away.
Yes, a website can download malware onto your computer, tablet, or smartphone. But only you can run that file! If you don’t run the file, the malware won’t be able to infect your device.
But you need to be careful. Many times you’ll be tricked into opening a music file or a Word document or some other kind of file that seems legitimate, only to fall victim to a malware attack.
Phishing is one of the most common ways hackers steal information. Here’s how to protect yourself from a phishing attack:
- Don’t click any email links from people you don’t know.
- Install a password manager like Dashlane. If you visit a fake website, the login information will not automatically fill in.
- Don’t type any information on a website without an SSL certificate (i.e. the browser does not start with https).
- Install an antivirus with phishing protection like Norton 360.
- Check for tricky spelling errors in the domain name (e.g. façebook.com as opposed to facebook.com).
- If you’re ever unsure, close the browser and hand-type the domain name into your browser letter by letter.
- Use a tool such as SafetyDetectives’s vulnerability checker to see if the website has passed certain security checks.
- Make sure your device receives software updates automatically.
- Always use two-factor authentication (2FA) for important logins.
- Backup all of your important information.
Only some antiviruses offer this level of security. A full antivirus package which includes anti-phishing protection (such as Norton 360 or McAfee Total Protection) will protect against fake and dangerous websites. These top antiviruses will block all malware — phishing sites, viruses, spyware, ransomware, and any other kind of malware cybercriminals use to cause damage and steal information.