Selected short messages and links you might have missed if you don’t follow me on Twitter.
May 16, 2011
update: new malicious domain “adam-love .net” and 34,459 known infected sites #GoogleImagePoisoning
RT @mattcutts: A recent spam trend is hacking websites to insert rel=canonical pointing to hacker’s site. If U suspect hacking, check 4 it.
[h-online.com] Backwards Unicode names hides malware and viruses — very smart and simple trick!
May 18, 2011
[avast.com] Google-images poisoning stats — I wonder, where they get traffic data for malicious domains? the 2nd graph
May 20, 2011
May 22, 2011
The doorway-generating script for #GoogleImagePoisoning that I wrote about here has changed recently…
… it internally uses “LOVE-BLOGUSA .NET” domain (registered on May 18) and a new file xml.txt (this domain in base64 inside) …
… and new cloaking logic. Shows spammy pages for direct requests, redirects visitors from Google to Bing.com (maybe it doesn’t like my IP?)
[sucuri.net] osCommerce malware: Cannot redeclare corelibrarieshandler — another buggy attack breaks sites
May 23, 2011
[Google Webmaster Central] Easier URL removals for site owners — to remove rogue pages created by hackers from Google
May 25, 2011
[update] Unmask Parasite v0.5.276 — improved detection of one ongoing script injection attack
May 26, 2011
RT @wordpress: WordPress 3.1.3 security release now available. Please upgrade! (Also, 3.2 beta 2!)
RT @gcluley: SEO poisoning attacks top the charts when it comes to web threats, SophosLabs research reveals
[badwarebusters.org] Facebook clickjacking attack — invisible iframe posts FB comments with malicious links
May 27, 2011
[sucuri.net] Understanding .htaccess attacks – Part 1 — conditional redirects and malicious PHP “auto appends”
If you want more real-time experience, you can follow @UnmaskParasites on Twitter.