New script outstrips all other drive-by download risks
Major malicious domo
A newly-created malicious script has become the source of almost half the drive-by download attacks tracked by one security firm.
JSRedir-R accounts for around 43 per cent of all malicious infections found on websites over the last week, according to a study by net security firm Sophos, published on Thursday. The malware crops up with almost six times the frequency of its nearest rival, iFrame-F (which is recorded in seven per cent of attacks).
A chart from Sophos on the relative frequency of different web-based attacks can be found here. More pointers on how the JSRedir-R attack works, and how webmasters might guard against it, can be found here. ®
Eric Arthur Blair suggests...
"god only knows whats going to be next."
Is it 1 Boot (stamping on) 1 Face (forever)?
>I thought that was the most disgusting thing I'd ever seen on the internet, until I saw 1 man 1 jar.<
Yeah, thanks for that. You owe me a new computer. This one smells real bad now
'2 girls 1 cup' < '1 guy 1 jar' < '1 guy 1 screwdriver'
god only knows whats going to be next.