Optimize Your Internet Security Projects

Discover how Vollna can revolutionize your search for Internet Security projects on platforms like Upwork. With advanced filters, real-time alerts, and detailed analytics, streamline your freelancing journey and land jobs that perfectly match your skills.
Signup for free to get access to all filter attributes and instant notifications when new jobs are posted.
Setup filter
"Internet Security"



Get access to over 30+ filter attributes, setup instant notifications, integrate with your CRM and marketing tools, and more.
Start free trial
176 projects published for past 72 hours.
Job Title Budget
Ethical Hacking for Mobile & Laptops
~1 - 5 USD / hr
2 days ago
Client Rank - Risky

Payment method not verified
1 open job
no reviews
Registered at: 30/03/2025
IN India
Risky
I'm in need of an ethical hacker who can help me identify vulnerabilities in my mobile devices and laptops. The main objective is to ensure the security of these devices.

Ideal skills for the job include:
- Proficiency in penetration testing
- Expertise in identifying vulnerabilities
- Experience in testing security protocols

Please provide examples of previous similar work you've done.

Skills: Web Security, Testing / QA, Computer Security, Website Testing, Internet Security
Hourly rate: 100 - 400 INR
2 days ago
  • Websites, IT & Software, Web Security, Testing / QA, Computer Security, Website Testing, Internet Security
DevOps Engineer Needed for Server Evaluation and optimization
~7 - 18 USD 3 days ago
Client Rank - Medium

Payment method verified
1 open job
no reviews
Registered at: 16/05/2024
IN India
Medium
I'm in need of a skilled DevOps engineer to conduct a comprehensive evaluation of my server. The primary focus of this assessment is to optimize resource allocation. The server hosts a variety of applications, including web applications, databases, and microservices.

Key responsibilities:
- Evaluate server load and resource distribution
- Propose strategies for more efficient resource allocation
- Assess and enhance network security, application security, and data protection measures

Ideal candidates should possess:
- Extensive experience in DevOps and server management
- Deep understanding of web applications, databases, and microservices
- Strong skills in identifying and implementing cost-effective resource allocation strategies
- Proficiency in assessing and improving various aspects of security
- Excellent knowledge of optimizing networking resources

Skills: Linux, Web Security, Computer Security, Network Administration, Internet Security
Fixed budget: 600 - 1,500 INR
3 days ago
  • Websites, IT & Software, Linux, Web Security, Computer Security, Network Administration, Internet Security
Restricted / locked Instagram acct
not specified 2 days ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
I believe it has to do with 2FA. The page is visible to the end user but we can’t get into it from admin side. I attached a couple pictures for reference.
Skills: Accounting, Technical Support, Information Security, Instagram, Digital Marketing, Social Media Marketing, Social Media Management, Ethical Hacking, Facebook Page, Malware Removal, WordPress Malware Removal, Facebook, Instagram Reels, Data Recovery, Internet Security
Budget: not specified
2 days ago
  • Admin Support, Virtual Assistance
Ethical hacking
not specified 2 days ago
Client Rank - Risky

Payment method not verified
no reviews
DE Germany
Risky
Hello!

I'd like to ask you if you are able to help me with my situation..
I feel like my spouse is not truthful and might be cheating on me.. she’s in the uk and I’m in Germany atm so I’d like to be able to monitor her phone even just for a short time to get insights if my worries are indeed valid.

Nico T
Skills: Security Assessment & Testing, Vulnerability Assessment, Kali Linux, Application Security, Penetration Testing, Network Security, Security Infrastructure, Manual Testing, Ethical Hacking, OWASP, Windows Server, NIST SP 800-53, Internet Security, Web Application Security, Security Engineering
Budget: not specified
2 days ago
  • IT & Networking, Information Security & Compliance
Cybersecurity Expert Needed for Account Security Assessment
100 USD 2 days ago
Client Rank - Risky

Payment method not verified
no reviews
SA Saudi Arabia
Risky
We are looking for a cybersecurity expert to assist in hacking social media accounts that aimed at teenagers sex trade in Saudi Arabia.
Skills: Information Security, Vulnerability Assessment, Security Analysis, Encryption, Internet Security
Fixed budget: 100 USD
2 days ago
  • IT & Networking, Information Security & Compliance
Network Security Audit for Compliance
~6 - 19 USD 2 days ago
Client Rank - Risky

Payment method not verified
1 open job
no reviews
Registered at: 31/03/2025
AU Australia
Risky
Our small company is in need of a comprehensive network security audit. The primary objective of this audit is to ensure we are in compliance with critical regulations including GDPR, HIPAA, and PCI-DSS.

Ideal candidates for this project should have:
- Extensive experience in conducting network security audits
- In-depth knowledge of GDPR, HIPAA, and PCI-DSS compliance standards
- Proven track record of identifying vulnerabilities and recommending improvements

We are looking for a professional who can provide a detailed report of our current security status, pinpoint areas of non-compliance, and suggest necessary improvements to our existing security measures. Your expertise will be crucial to our company's operational integrity and legal compliance.

Skills: Web Security, Computer Security, Technical Writing, Cisco, Internet Security
Fixed budget: 10 - 30 AUD
2 days ago
  • Websites, IT & Software, Writing & Content, Web Security, Computer Security, Cisco, Internet Security, Technical Writing
Drop shipping
not specified 1 day ago
Client Rank - Medium

Payment method verified
1 jobs posted
open job
no reviews
IL Israel
Medium
We’re excited to have you! As a drop shipping worker, you play a key role in our operations. Here’s an overview of your responsibilities:

### Job Title: Drop Shipping Worker

#### Key Responsibilities:

1. **Product Management:**
- Research and select trending products.
- Update product details and catalog.

2. **Order Processing:**
- Monitor and process customer orders.
- Ensure accurate and timely shipping.

3. **Customer Service:**
- Respond to customer inquiries and resolve issues.
- Maintain a positive company image.

4. **Supplier Communication:**
- Foster relationships with suppliers.
- Negotiate pricing and ensure quality standards.

5. **Inventory Management:**
- Check product availability regularly.
- Update stock status on platforms.

#### Skills and Qualifications:

- Strong communication and organizational skills.
- Basic knowledge of e-commerce platforms.
- Ability to multitask effectively.
Skills: Legal, Packaging Design, Legal Consulting, Intellectual Property Protection, Legal Research, Copyright Law, Internet Security, Trademark, Intellectual Property Law, Data Privacy, Intellectual Property Consulting, Copyright, Label Design, Material Take-Off, Digital Millennium Copyright Act
Budget: not specified
1 day ago
  • Legal, Corporate & Contract Law
Gmail Account Recovery and Security Enhancement
15 - 48 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
no reviews
CA Canada
Risky
We are seeking an expert to assist with Gmail account recovery and implement robust security measures to protect against hacking attempts. The ideal candidate should have experience in account recovery processes, as well as strategies to enhance security settings. Your expertise will help ensure that our Gmail account remains secure and accessible. Please provide details of your previous experience in similar tasks.
Skills: Ethical Hacking, Information Security, Internet Security, Security Analysis, Penetration Testing
Hourly rate: 15 - 48 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Cyber Essentials Plus Certification for SMB
~439 - 878 USD 1 day ago
Client Rank - Excellent

Payment method verified
$94 056 total spent
109 hires , 3 active
5 open job
5.00 of 3 reviews
Registered at: 31/07/2020
GB United Kingdom
Excellent
We are a small business with 12 employees (some employees have more than one laptop as we are a software company and need different devices for desting apps etc), seeking expert assistance with obtaining our Cyber Essentials Plus certification. We're starting from scratch with our cybersecurity initiatives and need guidance in several key areas:

We currently have a mix of

- Windows laptops
- Ubuntu laptops
- MAC books

We are a virtual business with most of the team working from home (no central office/network), so home broadband connections/routers also need to be included in the scope (if needed).

We use Google Workspace, Git, Quickbooks, wise.com, Gocardless, OVH, AWS.

End of the project is passing certification.

Skills: Computer Security, Internet Security, Security
Fixed budget: 37,500 - 75,000 INR
1 day ago
  • Websites, IT & Software, Engineering & Science, Computer Security, Internet Security, Security
Facebook Recovery
not specified 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
Hello!
I need assistance with facebook recovery.
Job: $75.
If all I can get is my data log of messages, that will suffice as I lost my dad and want to recover my messages sent and received from him and pertaining to him.

JA
Skills: Accounting, Technical Support, Information Security, Instagram, Digital Marketing, Social Media Marketing, Social Media Management, Ethical Hacking, Facebook Page, Malware Removal, WordPress Malware Removal, Facebook, Instagram Reels, Data Recovery, Internet Security
Budget: not specified
1 day ago
  • Admin Support, Virtual Assistance
Linkedin
not specified 1 day ago
Client Rank - Medium

Payment method verified
3 jobs posted
open job
no reviews
GB United Kingdom
Medium
Hi, can you help me recover some restricted LinkedIn accounts? I have tried with Persona (ID) verification but I am unable to proceed. I have just posted a job about it. Let's discuss
Skills: PDF Conversion, Ethical Hacking, Internet Security, Data Recovery, Social Media Account Integration, Network Security, LinkedIn, Information Security, LinkedIn Campaign Manager, Company LinkedIn Profile, Facebook Business Page, Instagram, Facebook, Google, Google Ads Account Setup
Budget: not specified
1 day ago
  • Data Science & Analytics, Data Analysis & Testing
Gmail message recovery
not specified 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
BD Bangladesh
Risky
My gmail message are permanently deleted, can you recover?
Skills: Facebook, Instagram, Troubleshooting, Technical Support, Ethical Hacking, Information Security, Facebook Page, Internet Security, Data Recovery, Facebook Advertising, Network Security, Cybersecurity Management, Customer Service, Vulnerability Assessment, Recovery Testing
Budget: not specified
1 day ago
  • Customer Service, Customer Experience & Tech Support
Internet security
20 - 50 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
no reviews
CA Canada
Risky
Help getting a hacked account back if possible. I will need help to access a hacked account. The hackers are currently using information is there any way possible you can help me thank you. I will definitely pay for a job well done. Thank you
Skills: Python, Google Sheets, Cybersecurity Tool, Penetration Testing, Red Team Assessment, Cyber Threat Intelligence, Vulnerability Assessment, PCI DSS, Firewall, Network Penetration Testing, Web App Penetration Testing
Hourly rate: 20 - 50 USD
1 day ago
  • IT & Networking, Information Security & Compliance
Facebook account
not specified 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
AL Albania
Risky
Hello!

Someone hacked my facebook profile and then removed me as admin on my facebook groups. Can you reclaim my groups? (I no longer have access to the groups. I wasn’t admin with my profile just with pages.)
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget: not specified
1 day ago
  • Customer Service, Customer Experience & Tech Support
Instagram recovery
not specified 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
DE Germany
Risky
Hello!

I'm interested in recovering an Instagram account with a lost password
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget: not specified
1 day ago
  • Customer Service, Customer Experience & Tech Support
Regain access
not specified 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
Hello!
I need help regaining access to accounts, which have been hacked. This includes social media and emails etc. please contact me at your soonest convenience.

Thanks,
Brittany L
Skills: Information Security, WordPress Malware Removal, Internet Security, Ethical Hacking, Bitcoin, Network Security, Security Testing, OWASP, Malware Removal, Blockchain, Web Application Security, Website Security, WordPress, Penetration Testing, Cryptocurrency
Budget: not specified
1 day ago
  • IT & Networking, Information Security & Compliance
VAPT and Security Compliance Support(CERT-IN Empanelled Vendor Required) -- 2
~5 - 9 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$185 097 total spent
189 hires , 33 active
6 open job
4.99 of 11 reviews
Registered at: 07/01/2019
IN India
Excellent
Project Overview
We are seeking the services of a CERT-IN empanelled cybersecurity vendor or professional to carry out a Vulnerability Assessment and Penetration Testing (VAPT) and assist in completing mandatory client security compliance questionnaires. This engagement is crucial for vendor onboarding with major corporate clients and insurance partners.
Scope of Work:
1. Vulnerability Assessment & Penetration Testing (VAPT):
o Perform comprehensive internal and external VAPT of our infrastructure, including web applications, APIs, servers, and endpoints.
o Assess network and application layer vulnerabilities.
o Provide a detailed report including:
 Risk categorization (High/Medium/Low)
 Technical findings with evidence (screenshots, logs)
 Suggested remediation
 Final re-validation report after fixes
2. Compliance Documentation Support:
o Assist in completing two client security assessments:
 “Partner Onboarding – Security Parameters of Client Environment”
 “Digit – Vendor Self Assessment Questionnaire”
o Align responses with industry best practices and regulatory standards (ISO 27001, NIST, CERT-IN).
o Provide documented evidence such as:
 Information Security Policy
 Secure configuration baselines
 Data classification and protection policies
 Business continuity and disaster recovery plans
 Access control and monitoring procedures
3. Evaluation & Risk Score Optimization:
o Understand the evaluation matrix and risk scoring methodology used by clients.
o Recommend corrective actions to improve security posture and compliance scores.
o Ensure documentation is audit-ready and presentable.
Mandatory Requirement:
• The selected professional must be a CERT-IN empanelled vendor or work in association with one. Proof of empanelment will be required.
Deliverables:
• Initial and Final VAPT Reports
• Completed security assessment questionnaires
• Supporting documentation (security policies, technical artifacts)
• Advisory notes on risk mitigation and compliance readiness
Required Skills:
• Vulnerability Assessment & Penetration Testing (VAPT)
• Experience with CERT-IN standards and compliance
• Security Questionnaire Handling & Audit Documentation
• Knowledge of ISO 27001, NIST, and Indian IT Act compliance
• Network Security & Web Application Security Testing
• Firewall, IDS/IPS, and Endpoint Security Assessment
• Report Writing – Technical and Non-Technical (Audit-ready)
• Risk Analysis & Mitigation Planning
• Incident Response and Business Continuity Knowledge
• Familiarity with tools like Burp Suite, Nmap, Nessus, OWASP ZAP, Metasploit
• Certifications (preferred): CEH, OSCP, CISSP, CISA
Timeline:
• Kickoff: Immediate
• Duration: 2-3 weeks (negotiable based on availability and scope)
Budget:
• Please quote your fixed price for the complete engagement or hourly rate.
• Attach sample VAPT reports or redacted past project documentation, if available.

Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate: 400 - 750 INR
1 day ago
  • Websites, IT & Software, Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
VAPT and Security Compliance Support(CERT-IN Empanelled Vendor Required)
~5 - 9 USD / hr
1 day ago
Client Rank - Excellent

Payment method verified
$185 097 total spent
189 hires , 33 active
6 open job
4.99 of 11 reviews
Registered at: 07/01/2019
IN India
Excellent

Project Overview
We are seeking the services of a CERT-IN empanelled cybersecurity vendor or professional to carry out a Vulnerability Assessment and Penetration Testing (VAPT) and assist in completing mandatory client security compliance questionnaires. This engagement is crucial for vendor onboarding with major corporate clients and insurance partners.
Scope of Work:
1. Vulnerability Assessment & Penetration Testing (VAPT):
o Perform comprehensive internal and external VAPT of our infrastructure, including web applications, APIs, servers, and endpoints.
o Assess network and application layer vulnerabilities.
o Provide a detailed report including:
 Risk categorization (High/Medium/Low)
 Technical findings with evidence (screenshots, logs)
 Suggested remediation
 Final re-validation report after fixes
2. Compliance Documentation Support:
o Assist in completing two client security assessments:
 “Partner Onboarding – Security Parameters of Client Environment”
 “Digit – Vendor Self Assessment Questionnaire”
o Align responses with industry best practices and regulatory standards (ISO 27001, NIST, CERT-IN).
o Provide documented evidence such as:
 Information Security Policy
 Secure configuration baselines
 Data classification and protection policies
 Business continuity and disaster recovery plans
 Access control and monitoring procedures
3. Evaluation & Risk Score Optimization:
o Understand the evaluation matrix and risk scoring methodology used by clients.
o Recommend corrective actions to improve security posture and compliance scores.
o Ensure documentation is audit-ready and presentable.
Mandatory Requirement:
• The selected professional must be a CERT-IN empanelled vendor or work in association with one. Proof of empanelment will be required.
Deliverables:
• Initial and Final VAPT Reports
• Completed security assessment questionnaires
• Supporting documentation (security policies, technical artifacts)
• Advisory notes on risk mitigation and compliance readiness
Required Skills:
• Vulnerability Assessment & Penetration Testing (VAPT)
• Experience with CERT-IN standards and compliance
• Security Questionnaire Handling & Audit Documentation
• Knowledge of ISO 27001, NIST, and Indian IT Act compliance
• Network Security & Web Application Security Testing
• Firewall, IDS/IPS, and Endpoint Security Assessment
• Report Writing – Technical and Non-Technical (Audit-ready)
• Risk Analysis & Mitigation Planning
• Incident Response and Business Continuity Knowledge
• Familiarity with tools like Burp Suite, Nmap, Nessus, OWASP ZAP, Metasploit
• Certifications (preferred): CEH, OSCP, CISSP, CISA
Timeline:
• Kickoff: Immediate
• Duration: 2-3 weeks (negotiable based on availability and scope)
Budget:
• Please quote your fixed price for the complete engagement or hourly rate.
• Attach sample VAPT reports or redacted past project documentation, if available.



Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate: 400 - 750 INR
1 day ago
  • Websites, IT & Software, Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Cyber Security Expert Needed
~1 - 5 USD / hr
1 day ago
Client Rank - Risky

Payment method not verified
1 open job
no reviews
Registered at: 01/04/2025
IN India
Risky
I am in need of a seasoned cyber security professional, with a strong focus on network and web application security. The selected freelancer will be responsible for conducting penetration testing to ensure the integrity and security of my network.

Key Responsibilities:
- Conduct comprehensive penetration testing on my network and web applications.
- Identify potential vulnerabilities and propose effective solutions.

Ideal Skills and Experience:
- Extensive experience in network and web application security.
- Proven track record in penetration testing.
- Ability to provide detailed assessments and recommendations.

Please note, your application should prominently feature your relevant experience in cyber security, particularly with network and web application security.

Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate: 100 - 400 INR
1 day ago
  • Websites, IT & Software, Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
UISP Console 912 Wireguard Setup -- 2
10 - 30 USD 1 day ago
Client Rank - Medium

Payment method verified
1 open job
no reviews
Registered at: 28/07/2023
RO Romania
Medium
I'm seeking a professional with experience in network security and VPNs to configure Wireguard on my UISP Console 912. The primary goal of this project is to establish secure remote access.

Key Requirements:
- Design and implement new Wireguard configurations tailored for secure remote access.
- Ensure connectivity and security for 1-5 devices.

Ideal Skills:
- Proficient in Wireguard and UISP Console 912.
- Strong background in network security.
- Proven experience in configuring VPNs for secure remote access.

Please note, no pre-existing configurations will be provided. Your expertise and creativity will be essential in crafting a robust, secure setup from scratch.

Skills: Web Security, Computer Security, Network Administration, Internet Security
Fixed budget: 10 - 30 USD
1 day ago
  • Websites, IT & Software, Web Security, Computer Security, Network Administration, Internet Security
Instagram Account Security Consultant
30 USD 1 day ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
We are seeking a skilled Instagram security consultant to assess and enhance the security of our Instagram account. The ideal candidate will have experience with ethical hacking, vulnerability assessment, and social media security protocols. Your responsibilities will include identifying potential security threats, providing recommendations for account protection, and ensuring our sensitive information remains secure. If you have a strong background in social media security and a passion for protecting online assets, we want to hear from you!
Skills: Information Security, Penetration Testing, Internet Security, Ethical Hacking, Instagram
Fixed budget: 30 USD
1 day ago
  • Accounting & Consulting, Accounting & Bookkeeping
Instagram y Facebook hackeado e inhabilitado
100 USD 23 hours ago
Client Rank - Medium

Payment method verified
1 jobs posted
open job
no reviews
ES Spain
Medium
Hola, me pongo en contacto con usted porque me gustaría obtener más información sobre sus servicios. Me hackearon e inhabilitaron la cuenta de Instagram y Facebook.
Estoy buscando a alguien serio, experto y cualificado que sepa recuperar cuentas hackeadas o inhabilitadas.
En el mes de marzo me hackearon la cuenta de Instagram a través de Facebook, alguien entró desde el Facebook y vinculó una cuenta ajena dentro de mi perfil de Facebook y siguidamente entro en mi Instagram lo hackeo las dos cuenta, ahora mismo no puedo acceder a ninguna de mis redes sociales, intente por formulario, email, teléfono, por las plataformas de Instagram y Facebook pero no consigo acceder.

Adjunto algunas capturas para que veas y valores el caso, la cuenta @kmaria_drzdx5208 no es mi cuenta, es la que me ha hackeado el Facebook e Instagram.

Si crees que es posible recuperarlas, no dudes en ponerte en contacto conmigo para poder hablar y llegar a un acuerdo.

Quedo pendiente para cualquir cosa.

Un saludo y gracias.

Joe
Skills: Information Security, Ethical Hacking, Facebook, Penetration Testing, Network Security, Data Recovery, Instagram, Internet Security, Recover Data Recovery Software, HackerRank
Fixed budget: 100 USD
23 hours ago
  • Admin Support, Virtual Assistance
OSINT Pentest on WASP and Infrastructure
30 - 250 USD 23 hours ago
Client Rank - Excellent

Payment method verified
$169 846 total spent
220 hires , 20 active
27 open job
5.00 of 1 reviews
Registered at: 01/06/2023
KR Korea, Republic of
Excellent
I'm seeking a skilled pentester with OSINT expertise to conduct a security assessment of our web applications and infrastructure.

Key Responsibilities:
- Perform a thorough penetration test on our web applications.

Ideal Skills:
- Proficiency in web application security testing.
- Extensive experience in OSINT techniques.
- Familiarity with various pentesting tools.

timeline to deliver all requirements within 7 days while maintaining high-quality standards. Below is the detailed plan:

Timeline (7 Days)
Day 1: Initial Assessment and Setup

Review the existing intranet and network environment.
Identify gaps in access control and security.
Set up the Docker/VM environment for Red/Blue team configurations.
Day 2-3: Access Control and SSO Implementation

Integrate Single Sign-On (SSO) for secure and streamlined authentication.
Implement role-based access control mechanisms.
Test and validate SSO functionality for different user roles.
Day 4-5: Red/Blue Team Setup and Penetration Testing

Set up Red/Blue team configurations using VM/Docker to simulate attack/defense scenarios.
Perform penetration testing on the application and network using Linux/WSL2.
Day 6: Network Monitoring Setup

Deploy and configure network monitoring tools for real-time traffic analysis and threat detection.
Address any security issues identified during penetration testing.
Day 7: Final Testing, Documentation, and Handover

Conduct thorough end-to-end testing of all implemented solutions.
Prepare and deliver comprehensive project documentation and guides.
Handover and provide post-deployment support.
Deliverables
Fully configured Docker environment with integrated SSO.
Red/Blue team setup documentation and configuration files.
Penetration testing report with remediation steps.
Network monitoring system deployed and operational.
Final project documentation and user guides.

Skills: Web Security, Network Administration, Internet Security, Git, Docker
Fixed budget: 30 - 250 USD
23 hours ago
  • Websites, IT & Software, Web Security, Network Administration, Internet Security, Git, Docker
Remove injected code and clean wordpress site
not specified 20 hours ago
Client Rank - Good

Payment method verified
$6 257 total spent
9 hires
13 jobs posted
69% hire rate, open job
5.00 of 6 reviews
GB United Kingdom
Good
Hi, i have had this message from my webhost and i am looking for someone to fix the problem, can you help?

i am out of the office most of the day but i will keep checking in to see if you have replied

thanks
James

The Sucuri Scanner found the following code injected via the active theme to the database:




https://sitecheck.sucuri.net/results/https/www.female-seeds.co.uk

http://labs.sucuri.net/db/malware/malware.magento_shoplift?51.16

The infection has spread among your WordPress posts/pages and it looks like that in the site's database:

https://blog.sucuri.net/2024/04/magento-shoplift-ecommerce-malware-targets-both-wordpress-magento-cms.html

Fortunately, your WordPress files appear to be unaffected and show no signs of malicious activity:

Scanning: /home/u219-gac4k9rp6wtr/.
Scanned Files : 23488
Scanner Hits : 0


It's important to note that our Site Scanner tool is designed to clean website files only, it seems the infection has targeted your WordPress database.

Given this situation, I recommend consulting with a security expert to thoroughly clean your database. If you do not have a developer on hand and need assistance, you might consider our web development services available through our Expert Care support channel:

https://eu.siteground.com/kb/expert-care-subscription/

Please feel free to reach out if you have any more questions or need further assistance.

Sincerely,

Nadya M.
Technical Support Team
Skills: On-Page SEO, Web Development, PHP, WordPress Malware Removal, Internet Security, Virus Removal, Malware Removal, Website Security, WordPress, Website Migration, CMS Development, PHP Script
Budget: not specified
20 hours ago
  • Web, Mobile & Software Dev, Web Development
Recover business manager for fb celeb
not specified 20 hours ago
Client Rank - Medium

Payment method verified
1 jobs posted
100% hire rate, open job
no reviews
CA Canada
Medium
Facebook administrator who's been locked out of fb bm for 12 months. 15 meta requests and 15 meta replies saying there's been no breech. Still unable to get help. New computer, Microsoft business premium installed. Microsoft authenticator in use. Still no movement.
TheIceRoadAlex is the page in question.
I am jackie.ameriault on fb.
Maybe a lawyer is in order business can't find one lol
Skills: Facebook, Instagram, Troubleshooting, Digital Marketing, Ethical Hacking, Security Management, Internet Security, Facebook Page, Facebook Pixel Setup & Optimization, Facebook Ads Manager, Facebook Business Page, Technical Support, Instagram Ad Campaign, TikTok
Budget: not specified
20 hours ago
  • Accounting & Consulting, Accounting & Bookkeeping
Instagram and Facebook hacked
not specified 18 hours ago
Client Rank - Medium

Payment method verified
3 jobs posted
open job
no reviews
ES Spain
Medium
Hola, me pongo en contacto con usted porque me gustaría obtener más información sobre sus servicios. Me hackearon e inhabilitaron la cuenta de Instagram y Facebook.
Estoy buscando a alguien serio, experto y cualificado que sepa recuperar cuentas hackeadas o inhabilitadas.
En el mes de marzo me hackearon la cuenta de Instagram a través de Facebook, alguien entró desde el Facebook y vinculó una cuenta ajena dentro de mi perfil de Facebook y siguidamente entro en mi Instagram lo hackeo las dos cuenta, ahora mismo no puedo acceder a ninguna de mis redes sociales, intente por formulario, email, teléfono, por las plataformas de Instagram y Facebook pero no consigo acceder.
Si crees que es posible recuperarlas, no dudes en ponerte en contacto conmigo para poder hablar y llegar a un acuerdo.

Quedo pendiente para cualquir cosa.

Un saludo y gracias.

Joe
Skills: Security Assessment & Testing, Vulnerability Assessment, Kali Linux, Application Security, Penetration Testing, Network Security, Security Infrastructure, Manual Testing, Ethical Hacking, OWASP, Windows Server, NIST SP 800-53, Internet Security, Web Application Security, Security Engineering
Budget: not specified
18 hours ago
  • IT & Networking, Information Security & Compliance
Malware Removal for Bluehost Websites
not specified 14 hours ago
Client Rank - Excellent

Payment method verified
$95 687 total spent
13 hires
22 jobs posted
59% hire rate, open job
4.76 of 5 reviews
US United States
Excellent
I am seeking a skilled professional to perform malware removal on multiple Bluehost websites that are currently down. The ideal candidate should have experience with website security, malware detection, and removal. Your expertise is crucial to ensure that all sites are restored to full functionality and safeguarded against future threats. Please provide examples of similar work you have completed in the past.
Skills: Virus Removal, WordPress, WordPress Malware Removal, Internet Security
Budget: not specified
14 hours ago
  • Web, Mobile & Software Dev, Web & Mobile Design
I’ve been hacked & want to know by who
not specified 13 hours ago
Client Rank - Risky

Payment method not verified
no reviews
US United States
Risky
I’ve been hacked & have been receiving threats ! I’ve been receiving threatening messages & so has my family members. I just want to trace the number that has been messaging me.
Skills: Penetration Testing, Information Security, Vulnerability Assessment, Application Security, System Security, Firewall, Ethical Hacking, Security Analysis, Security Infrastructure, Security Testing, Internet Security, Database Security, Security Assessment & Testing
Budget: not specified
13 hours ago
  • IT & Networking, Information Security & Compliance
Instagram got hacked
not specified 10 hours ago
Client Rank - Risky

Payment method not verified
2 jobs posted
open job
no reviews
PK Pakistan
Risky
Urgent: Instagram got hacked .

My instagram got hacked .I discovered that my password, email, phone number and two factor authentication had been changed, and unauthorised posts were made. I have attempted to reset my password, but it was unsuccessful. My account activity shows suspicious stories containing scam links. I am the rightful owner of this account. I am requesting you to please help me to get my account back.
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget: not specified
10 hours ago
  • Customer Service, Customer Experience & Tech Support
Malware testing for detection and response
300 USD 4 hours ago
Client Rank - Excellent

Payment method verified
$101 651 total spent
70 hires
148 jobs posted
47% hire rate, open job
4.89 of 41 reviews
US United States
Excellent
Looking someone to evaluate an new EDR solution, against other EDRs, under different frameworks, Testing scope will be provided, Looking someone who can work with offshore team and complete the testing, we need someone who knows how to work with offshore developers and get desired results, this may become on going task once we go for proper certifications
Skills: Information Security, Network Security, Penetration Testing, Security Analysis, Internet Security
Fixed budget: 300 USD
4 hours ago
  • IT & Networking, Information Security & Compliance
Need a ethical hacker
not specified 52 minutes ago
Client Rank - Risky

Payment method not verified
no reviews
IN India
Risky
Need a ethical hacker for a smll project related to cyber security
Skills: Security Testing, Network Security, Vulnerability Assessment, Penetration Testing, Web Application Security, Network Penetration Testing, Internet Security, Information Security Audit, Website Security, API Testing, OWASP, Code Review, Web App Penetration Testing, Security Assessment & Testing, Ethical Hacking
Budget: not specified
52 minutes ago
  • IT & Networking, Information Security & Compliance
Call to action
Freelancing is a business
Make it more profitable with Vollna

Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.