Protect your website with a comprehensive suite of website security services that help safeguard, prevent, detect and recover from malicious hacker attacks. StopTheHacker constantly monitors for new strains of malware and protects your online business from emerging threats.
How to Buy
To determine the security package that best suits your needs, we recommend speaking with a website security expert. Click here to schedule your complimentary consultation with a Verio security expert.
|Reputation and Blacklist Monitoring|
|Standard Malware Detection|
|Scan for known malware|
|Scan for known viruses|
|All pages scanned during every scan|
|Advanced Malware Detection|
|Scan for unknown malware|
|Use artificial intelligence engine|
|Automatic malware removal|
|Scan corporate Facebook wall|
|Server-side Malware Detection|
|Phishing Page Detection|
|PHP Spam Shell Detection|
|Web page defacement detection|
|Insecure folder permissions detection|
|.htaccess hack etection|
|Website error reporting|
|Application vulnerability assessment|
|Server vulnerability assessment|
|Annual security audit|
Standard Malware Detection protects your website from malware & hackers
Each scan checks all pages of your website for known viruses and web malware threats to see if hackers have injected malicious code into your website. The standard malware detection tool uses a signature-based approach to catch known malware and viruses.
Advanced Malware Detection with Artificial Intelligence
Adding to the standard Malware Detection, the artificial intelligence based engine with advanced self-adapting capabilities constantly monitors for new strains of malware and protects your online business from these emerging threats. This advanced feature protects the website from never-before-identified malware.
Blacklist and Reputation Monitoring
Blacklist Monitoring is a comprehensive daily check on the status of your website on Google’s Safe Browsing List and other search engines including Yahoo, and Bing; malware blacklists like Malware Patrol and Malware URL; DNS Blacklists; phishing blacklists like PhishTank; spam blacklists like SpamCop; and many more. StopTheHacker will automatically notify you if your website ends up on a blacklist and help you to remove your site from the search engine blacklist.
This feature identifies vulnerabilities in your configuration so you can patch them in order to prevent web-based attacks by bots and hackers. StopTheHacker will scan for over 35,000 vulnerabilities on your server(s), website and infrastructure. StopTheHacker searches for web application vulnerabilities in WordPress, Drupal, Django, Joomla, Ruby on Rails, OpenCMS and can uncover vulnerabilities in custom installations as well.
This gives real-time information on the page speed and response times of your website using detailed graphs. In the event that a site goes down, StopTheHacker will automatically send an email notification.
Up-time Monitoring gives an overview of the availability of your website including details on down time within the last weeks. This information is displayed on a detailed graph and is available by simply clicking on your domain name in the dashboard. In the event that your site goes down, StopTheHacker will automatically send an email notification.
StopTheHacker trust seal
Trust seals are known to boost the confidence of website visitors (research suggests an 11% increase in sales). The security trustmark indicates a level of protection the website is receiving. Using the StopTheHacker Trust Seal on a website and online store shows visitors and customers that a website owner cares about safety while visiting your website. When customers see that your site is scanned and protected by StopTheHacker, it provides a sense of security and they can be confident that they are visiting and interacting with a site that takes security seriously.
No software to install
With StopTheHacker, there’s no software to install or manage. It is a 100% cloud based solution with an easy to manage control panel. This product is non-intrusive: offered on a Software as a Service (SaaS) basis and runs outside the firewall.
Fully automated scans with email alerts
StopTheHacker automatically scans your website for malware and viruses. Depending on your service plan, the scan frequency will vary from being done weekly to continuously. This is a 100% automated scan. If StopTheHacker identifies malware on your website, they will immediately email a detailed report of their results. . Users also have the option to log into their account to view all scanning reports. StopTheHacker will also notify users if their site is found to be free from malware and no vulnerabilities are detected.
Users have the option to choose a scan that runs weekly, daily, hourly or continuously. The scan frequency is based on the service plan you select.
StopTheHacker does not stop at only protecting your website against hacker attacks, it also offers the possibility to check and protect your Facebook page against spam and scams. StopTheHacker Facebook Protection scans and monitors all content posted on your wall and news feed. It uses the latest technologies to identify whether a piece of content is malicious or related to phishing. By continuously monitoring with the latest web-based malware detection technologies, StopTheHacker can help protect your online persona on Facebook.
What happens when websites get blacklisted?
Why do websites get on a blacklist?
Malicious hackers and automated bots will infect the websites with malicious computer code, e.g. web-malware. In order to protect web surfers, security companies, search engines, browser manufacturers will prevent users from visiting these compromised sites. Websites may also land on a blacklist for a number of other reasons. Some of these reasons stem from the fact that websites that get hacked are often used to launch spam and phishing campaigns, and are used to send out emails to internet users trying to convince them to visit a fake banking site, buy pharmaceutical drugs, etc.
How do sites get hacked?
Websites can get hacked and compromised in many ways. Some of the primary reasons include.
Poor choice of passwords (Brute Force attacks)
A lot of website owners use simple passwords. Consider the fact that in a large scale password analysis study in 2011, 123456 was found to be one of the most common passwords used. To help prevent being hacked, user login credentials should include non trivial information such as av21bx instead of Alex.
Insecure FTP connections, password sniffing
A plethora of infections can be injected into a website by the attacker using the login credentials to connect to a site via FTP. These login credentials are sniffed by a silent Trojan or rootkit that has been embedded on a computer of a website administrator. Once the login credentials are obtained, they are passed on automatically to an IRC chat room where a master controller accesses the website and starts to infect the website with web-malware.
A lot of websites use web 2.0 functionality to primarily iterate with their users. This functionality can be in the form of letting users’ blog or post comments, sign up for newsletters, fill out a support form, a live chat session and much more. These are all avenues for a malicious hacker to inject malicious code into a website.
Third party add-ons
A growing trend is the use of third party add-ons into websites to provide more interesting functionality on a site, such as dynamic IP geo-location and image resizing. These third party pieces of code may harbor vulnerabilities that the original website owner may not even be aware of.
Some malware is specific to Internet Explorer, can you detect it?
Yes, we can detect malware that only triggers when a user browses a site using Internet Explorer. We also use various IP addresses to probe a single website. Additionally, we check for malware that triggers when a user visits search engine web pages like Google, Bing, Yahoo, etc.
My site has a Trustmark, am I safe?
No. Several companies sell trust marks. Some trust marks simply prove that you are a legitimate business, or that you will respect a user’s private data. Most trust marks are not related to the security of a website.
My site has a SSL certificate, I can see a padlock sign, am I immune?
No. SSL certificates have nothing to do with protection from malware attacks. SSL certificates simply prove that your site is the website it claims to be. It is a sign of a responsible business who wants to confirm their identity to the visitor.
My site is PCI certified, am I immune?
PCI certification is a good first step towards securing your website. Unfortunately, being PCI certified does not ensure immunity to these attacks. PCI certification simply means that the website does follow some best practice guidelines. This does not ensure that a website is immune to code injection attacks.
Can advertisements on my website cause me to get blacklisted?
Yes, they can. Hackers can distribute malicious advertisements to advertisement distribution companies. These ads can find themselves circulated through the digital ecosystem onto various websites which can cause good websites to get marked as malware distribution points.
Why does my Speed Monitoring graph show -1 in the tooltip?
If StopTheHacker’s scanner probes your website and your website does not respond back to the request made for a page within 10 seconds, then the value in the speed monitoring/load time graph shows up as -1. This does not mean your website was not available or was down, it simply means it took more than 10 seconds for your website to respond back.
How can I change my preferences for Uptime and Speed Monitoring?
Log into your StopTheHacker account, then click “Edit Service” on the right of the website. You can then check/uncheck the speed and uptime monitoring boxes to enable/disable the features. If you uncheck the box for uptime monitoring, you will not receive any email alerts if your site becomes unavailable. Speed monitoring does not generate any alerts.
What is Uptime and Speed Monitoring?
Uptime Monitoring is a feature of StopTheHacker’s security service that will send you an alert if your website becomes unavailable. You also have the option to see a detailed status of your website’s uptime by logging into your account by visiting https://panel.stopthehacker.com. Speed Monitoring will allow you to see how fast your webpages are loading and website visitor experience. Both these features are available, free of cost to StopTheHacker’s users who subscribe to the professional, business or business + editions.
When I try to select a service from StopTheHacker, I see a message that says: Your site has 403 pages. My site only has 20 pages, Why do I see this message?
Your site may have many more publicly accessible web pages or web objects than you think. For example — Default pages hosted by your web server.PDF files, advertisement files (SWFs) accessible via your site. Dynamically generated by your content management system (WordPress) or framework (Django).
‡ All promotional offers are subject to certain terms and conditions. To review these terms and conditions, please refer to the related product's offering page.
Verio is a leading global provider of web hosting and cloud services. As a part of NTT, one of the world's largest telecommunications companies, we offer the stability businesses need in a long-term technology partner.
Domain Name Registration Verio offers Domain Name Registration. Every domain purchased through Verio includes a FREE 3-page website. Our Web Hosting Plans include FREE design and marketing tools and a FREE domain name to help you start your business online.
VPS Hosting For businesses looking to control costs, but that require higher security and performance, Verio VPS Hosting is ideal. You can rely on it for your high-traffic ecommerce sites, content management systems like WordPress and Joomla, or multisite hosting.
Dedicated Hosting When uptime is critical, Verio Dedicated Hosting provides you with private managed servers that let you focus on your business, test environment or website, while Verio handles the hardware.
Verio, viaVerio, and Verio's product names and their related logos are trademarks, service marks, and/or registered marks of Verio Inc. in the United States and other countries. All other names are trademarks or registered marks of their respective owners. All rights reserved.