Showing results 1 to 20 of 31

Ninemsn injected with malicious code: Websense

Security technology company Websense this week claimed that one of Australia's most highly trafficked websites, ninemsn, had been compromised by an outside party and injected with "malicious code", although the problem area has now been removed from the site.

February 16, 2010 by

20,000 sites hit with drive-by attack code

Hackers have broken into more than 20,000 legitimate Web sites to plant malicious code to be used in drive-by malware attacks.According to a warning from Websense Security Labs, the sites have been discovered to be injected with malicious JavaScript, obfuscated code that leads to an active exploit site.

May 31, 2009 by

Google sponsored links spreading (scareware) rogue AV

Malware hunters at Websense Security Labs have discovered legitimate Google sponsored links being used to plant scareware programs (rogue anti-virus applications) on the computers of Windows users.In a blow-by-blow description of the rogueware attack, Websense researcher Elad Sharf shows how an innocent Google search for the Winrar file archiver and data compression utility can lead to a fake C|Net downloads.

December 16, 2008 by

Websense reports China Netcom DNS cache poisoning

The DNS server of one of China's largest ISPs has been poisoned to redirect typos to a malicious site rigged with drive-by exploits.According to a warning from Websense Security Labs, the DNS poisoning attacks are affecting customers of China Netcom (CNC) and are using a malicious iFrame to launch exploits for known vulnerabilities in RealNetworks' RealPlayer,  Adobe Flash Player and Microsoft Snapshot Viewer.

August 21, 2008 by

CNET's Clientside developer blog serving Adobe Flash exploits

Yesterday, Websense Labs issued an alert regarding a compromised CNET blog, namely the Clientside developer blog which has been embedded with a malicious javascript code attempting to exploit the visitors through a well known vulnerability in Adobe Flash's player. Websense's alert :"Websense Security Labs ThreatSeeker Network has discovered that a CNET Networks site has been compromised.

August 7, 2008 by

Websense: UN, UK sites compromised by JavaScript injection

Websense on Tuesday said that the UN and UK government sites are being attacked in a mass JavaScript injection attack.According to Websense:Websense Security Labs has been tracking a recent development of the malicious JavaScript injection that compromised thousands of domains at the start of this month, just 2-3 weeks ago.

April 22, 2008 by

Bill website hacked

Security company Websense is reporting that the official website for ITV police drama The Bill has been compromised by hackers."Websense Security Lab has discovered that the official Web site of The Bill, the popular TV series, has been compromised and laden with malicious JavaScript code meant to infect visitors with a Trojan horse," said the Websense press release.

August 30, 2007 by

ALERT - Super Bowl website can infect your computer!

WebSense is reporting (via Suzi Turner) that the Super Bowl XLI / Dolphin Stadium website has been compromised with malicious code.  With all the traffic going there with the Super Bowl coming up, a lot of people will get infected.

February 2, 2007 by

Super Bowl stadium site hacked, seeded with exploits

The official Web site of Dolphin Stadium, home of Sunday's Super Bowl XLI, has been hacked and seeded with exploit code targeting two known Windows security flaws. In the attack, which was discovered by malware hunters at Websense Security Labs, the server hosting the site was breached and a link to a malicious JavaScript file was inserted into the header of the front page of the site.

February 2, 2007 by

Double Skype attack confuses security firms

Two different pieces of malware were set loose on Skype users this week and although neither seems to be causing serious problems, security firms are confused.Just 24 hours after warning that there may be a worm exploiting the popular Skype Internet telephony service, Websense reclassified the pest as a Trojan horse.

December 19, 2006 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories