February 09, 2012
Â
Symantec’s found that the New Year event itself presented an opportune theme for spammers. Symantec Intelligence identified a new tactic in spam emails that included URLs that related to more than 10,000 unique domain names. Each of these domains had earlier been compromised and the URLs pointed to PHP-based scripts hosted on the compromised websites, many of which referred to “New Year†in the file name. Some examples include, “HappyNewYear.php,†“new-year-link.php†or “new-year.link.php.â€Â The PHP scripts simply redirected the visitor to the real spam website, but the potential for malicious use also exists.
Posted by: pybadyfyto at
08:22 PM
| No Comments
| Add Comment
Why Glenn Gould may be the model for future T.O. startups
Post contains 210 words, total size 2 kb.
33 queries taking 0.0339 seconds, 72 records returned.
Powered by Minx 1.1.6c-pink.