Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: InfoSec News (alertsinfosecnews.org)
Date: Fri Oct 25 2013 - 03:30:51 CDT
By Lucian Constantin
IDG News Service
October 24, 2013
Visitors to the official website for the PHP programming language over the
past couple of days might have had their computers infected with malware.
php.net site called userprefs.js. The code made requests to a third-party
website that scanned visitors' browsers for vulnerable plug-ins and
executed exploits that, if successful, installed a piece of malware, said
Daniel Peck, a research scientist at Barracuda Networks.
One of Barracuda's research tools detected and captured attack traffic
from php.net late Tuesday evening, according to Peck.
The exploits served during the attack came in the form of malicious SWF
files, so they most likely targeted vulnerabilities in Adobe Flash Player.
However, Barracuda's researchers are still conducting their analysis and
haven't identified yet exactly which vulnerabilities were targeted, Peck
Find the best InfoSec talent without breaking your
recruiting budget! Post a Job, $99 for 31 days.
Hot InfoSec Jobs - http://www.hotinfosecjobs.com/