Google on the Internet malicious software
Today, Google has published on its official website a report entitled "All your iframe are point to us", drawn up by the security Google. This report focuses connected to the fact that more than three million Web pages at 180 sites in the arrival of thousands of users automatically try to install malicious software on his computer.
Interestingly, according to Google, most of the malware is on the Chinese web servers. At one of these servers, Google has been able to locate about 21 thousands of links from other sites (and also Chinese). It must be noted that about two per cent of infected sites in theory can spread malicious software through social networks in which they are registered.
At the experts Google has not stopped, they also learned how vulnerable server software. It turned out that 38 percent of Web servers based on the Apache platform and the same percentage of plants in the language PHP (programming language used to create sites), are outdated and may be vulnerable to attacks from outside.
Статьи по теме:
Repair & servicing Windows registryMicrosoft Great Plains to customers in Russia: how to find a consultant and the most frequent questionsThe company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»IBM sends framework ACTF donated EclipseSystemic and local bus General characteristics of CybercrimeIcons in the design. Stages and stage of development of computer Enabling Windows XPSugarcrm In RussiaTheft of computer dataVARIETY COMPUTER VIRUSESChecking Software LicensingHow to choose the CRM: Develop a short-list CRM systemsChanging the design desktopHold printingPC Peripherals LASER (LED) Plotters SWISH Max or Flash animation effectsSoa-platform Ijanet FreeThe attack at Infinity Gb V2 2 Document for LinuxPlanning in the operating system UNIXMake backup ropii professionally - Norton Ghost 14Developing databases, Inside ViewBus EISA The most demanded software!The choice of antivirus software for home computerMicroprocessors used in CompactPCI-systems1C Program Office Trade 8Backing up data. Should I pay?Hackers, as the subjects of computer crime"Trojan horse"TYPES LKSVarieties of computer crimeThe possibility of CompactPCI have more than 8 slotsLocal bus METHODS OF PROTECTION FROM COMPUTER VIRUSESMobile Trade Optimum - Office Business RepresentativesCrm, softwareThe processes in the operating system UNIXFire systems company Satel now can be controlled by phone or EthernetWhy work for a computer is harmful to human healthLIBCOM-2007: new items of high technology from the company «Alee Software»Technical approaches to increase the security of the computerInstalling Systems Videonablyudeniya In OfficeVISA-2000. Virtual seller of computer equipmentWhat is the codec and where they can be downloadedPen plotters (PP, PEN PLOTTER)Terms of the need for backup devices Restoring WindowsTips software and programs connected branch The signals under UNIX3Ds Max 2008 (Rip)MAINTENANCE AND spread of computer virusesComputer virus