HTTPCS provides you with a powerful tool to secure your Joomla website. This cyber security product is compatible with all CMS. It is accessible via a web interface and helps you to protect your website from hacking. Make your customers feel secure with a secure site.
Scan of your Joomla site for vulnerabilities
Listing of the corrective measures to apply
Personalized support included
Available for 14 days
Without Bank Footprint
To detect vulnerabilities on your site before they are exploited by a hacker, launch a security scan in just a few clicks. Once the scan is done, you access to your security vulnerabilities, their criticality levels and especially how to correct them. Reassure your customers with a secure, reliable site that complies with ISO 27001-27002 standards and GDPR privacy principles.
(14-day non-binding trial)
Our HTTPCS solution is fully compatible with Joomla CMS. Accessible to all and easy to use, the online scan detects the vulnerabilities of your website. Receive a daily audit report with the detected faults, their criticality levels and how to correct them. Indeed, despite the multiple themes, extensions and software’s updates, a security flaw may still occur! Don't wait for being hacked to protect your website. Take a proactive approach to secure your site with the HTTPCS SECURITY tool.
Go for our complementary products: check in real time your website's availability, the reliability of your content or set up a deep web watch to be notified whenever you become a target for black hat hackers.
Our team of web experts has developed a Joomla extension that facilitates the validation of your site so that vulnerability scanning can be performed.
This extension called "HTTPCS Validation" is available for free on our site. Once installed, you only have to fill in your contact details. The Joomla extension creates a unique identification file that allows HTTPCS to validate your site.
Joomla is a free CMS (Content Management System) which allows you to create and manage websites easily without requiring any technical knowledge. As for its competitors, it is possible to extend the functionality of the CMS by adding extensions. The extensions are developed by the members of the Joomla community, which represents about 560,000 people. However, these extensions are not always verified by professionals. Therefore, they can be at the origin of vulnerabilities that can jeopardize your site and its data.
In 2016, Joomla was hit by two critical security flaws successively. These two flaws are referenced in the CVE system. The first one (CVE-2016-8870) allows you to create one or several users due to a verification failure, even if the administrator has disabled the process. The second one (CVE-2016-8869) was discovered a few days later by the Joomla Security Strike Team (JSST) and could be used as a complement to the first vulnerability. This second one is particularly dangerous because it allows you to modify the privileges of a user account and perform unauthorized actions.
In December 2015, the famous CMS had already faced a vulnerability that had serious repercussions. Due to a vulnerability present in the version 3.4.6, a wave of attacks has affected the Joomla website owners. The security company Sucuri revealed that the flaw has generated 16,000 attacks per day. To prevent from your Joomla being a victim of hacking, launch your HTTPCS Vulnerability Scan: