On 7/1/12 8:35 PM, Glen Roberts wrote:
Agreed, Robert. I believe many issues are likely the ads and/or comments.


Glen Roberts


On Jul 1, 2012, at 19:28, Arch Angel <[email protected]> wrote:

I check a known bad site I came across which was due to ads, and wondered the 
same thing about CNET.

It could also be from comments people have left that they don't filter.  Either 
way its obvious that its there :-)

--

Thank you,

Robert Miller
http://www.armoredpackets.com

Twitter: @arch3angel

On 6/20/12 11:20 AM, Mike Patterson wrote:
On 12-06-20 8:03 AM, Glen Roberts wrote:
This morning while researching Google’s five-year anniversary of providing 
malware protection, I found evidence that CNET is serving up malware to its 
site visitors to the tune of 151 exploits, 64 trojans and 22 bots. The 
malicious software is hosted on internet-safeness.ru and publictivity.com 
appears to be an intermediary for distributing malware to site visitors.

I have notified CNET of the problem but it’s pretty concerning that another CBS 
property is making the news again for being insecure. It was only a few days 
ago that the Last.fm password hashes that were dumped made the news.

Here is the link you can use to take advantage of Google’s insight into sites 
serving malware: http://google.com/safebrowsing/diagnostic?site=cnet.com. Just 
replace the parameter with the site you want to inspect. I recommend you check 
out the sites you manage and visit using Google’s tool.

I've posted a screenshot here: 
http://www.internetgeneral.com/cnet-serving-malware/
One might be inclined to wonder, as I did, if it's CNET itself serving
up the malware, or an ad network that's been popped.

Mike

_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com
I couldn't resist:

   http://google.com/safebrowsing/diagnostic?site=google.com

Snippet:

   Malicious software includes 214 trojan(s), 47 exploit(s), 13
   worm(s). Successful infection resulted in an average of 1 new
   process(es) on the target machine.

   Malicious software is hosted on 17 domain(s)

:-)

--

Thank you,

Robert Miller
http://www.armoredpackets.com

Twitter: @arch3angel

_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to