The latest phish kit to show up in the world mimics the Chase Bank login page. It is designed to gather the user’s chase bank login credentials, social security number, mother’s maiden name, date of birth, and card details, and send them to a pre-set email address.

Read more →

Traffic hijacking is a major problem for companies in all industries, so how can you make sure you remain protected against malware redirects?

Read more →

eCommerce and website security - or lack there of - go hand in hand. The sensitive data necessary for online transactions can make customers and businesses vulnerable to cyber attacks. Find out what preventative measures you should take to ensure the security of your website and the privacy of your customers.

Read more →

Staying on top of website security regulations is now more important than ever. Find out about GDPR and what it means for your business and customers’ privacy.

Read more →

While malicious SEO Spam malware infections were starting to drop, recent activity indicates that they are on the climb again. Let’s look at this threat, why it is serious, and how you can be better protected.

Read more →

Because WordPress is so widely used, it’s often a target for hackers. One in particular, known as the ‘pharma hack,’ has been affecting many users lately. Read on to learn more about WordPress pharma hacking, and what you can do to protect your website.

Read more →

The more control you have over the website, the more you need to think about keeping it safe. Website malware monitoring and protection software are key defenses for keeping intruders out.

Read more →

How sure are you that your confidential information is safe with the domain that you are using? Know the signs to evaluate website security in order to better understand how your information is protected.

Read more →

A few days ago, the download counter of the WordPress Malware Scanner plugin passed 400K installations--and with good reason. This incredible plugin has a number of key advantages that have helped many of our customers build their websites and create the amazing online communities they've hoped for. We have been happy to provide the Malware Scanner for free to the WordPress community throughout its lifetime. It helps monitor malware and blacklisting to create safer websites for both owners and users.

Read more →

Malicious redirect to another URL is nothing new, but how you redirect, that is the big question. The most popular type of the redirect infection that our incident response team handled last year was implemented through themes and plugins. Since we keep receiving more customers getting infected with this type of redirection, we decided to make a short post about it. So how does this new type of redirection work?

Read more →

CryptoJacking is the unauthorized use of your device to mine digital currency. The number of the cryptocurrency malware infections that we handle has significantly increased since fall 2017. You may want to check our latest posts on the new trends in the cryptocurrency mining malware that has exploded in popularity among the hackers: Crypto Mining Malware on Popular Code Repositories Bitcoin Mining Using Visitors' Machines The good news is that CryptoJacking has already been deemed malicious by the cybersecurity industry and has also been agreed to be put in the same category as malware.

Read more →

Cryptocurrency mining malware is gaining popularity among hackers. Attackers are now using GitHub repositories and other well-known repositories for storing and serving the malicious code. On GitHub, the free accounts are being created to commit the obfuscated code and to use it in the injection later. The encrypted infection usually disguises itself as a legitimate jQuery or other familiar library files. It looks like in 2018 this new security threat - cryptojacking is here to stay.

Read more →

Brute-force attacks are a significant portion of the modern web server attack landscape, and the goal of these attacks is to gain access to content management system (CMS) dashboards by guessing admin usernames and passwords. After access has been achieved, hackers gain full control of the compromised website and can use it to send spam, inject malicious JavaScript code into a database, or just redirect all visitors to a third-party resource to generate traffic (also known as traffic hijacking).

Read more →

Background Only a few days ago, we released a write up about hackers using compromised websites for bitcoin mining. Just recently we responded to another hacking incident that uses the website visitor’s computer for bitcoin mining. Bitcoin mining is primarily a means of earning commission on bitcoin transactions. Here is a simplistic explanation of what bitcoin mining is and why hackers want to use your site’s visitors' computers. Each time a bitcoin is bought, traded or sold a record of the transaction must be created.

Read more →

In our recent post about anti-malware myths, we spoke of visitor dependent malware. Three of the methods used to identify which visitors to attack and which to hide from are geolocation awareness, IP address awareness, and language awareness. Malware and phishing content hidden on a business’s website may infect or ignore visitors from some locations but not others. This behavior can help malware to hide on a compromised website for weeks, months, or even years.

Read more →

Protecting Your Online Success with Anti-Malware for Websites ThreatSign users represent almost every industry out there. They are doing a great job, each one in their domain of expertise, in creating products and services that change the lives of their clients making them better. Assistive software solutions that help people with dyslexia and dysgraphia in their struggle to read and write, a biotech company researching new medicines, resort boutiques, healthcare services, and the list goes on.

Read more →

Public Computers, Malware, and I Never Thought I Would Find Malware There! Name seven places where you might find public computers. Let me see if I can guess what you came up with. Hotels, libraries, airports, coffee shops, job search assistance locations, schools, and conference facilities. Let me add one more; the microphone. Let's begin with the realization that some public computers are open to all or mostly all of the public, but even those that have restrictions on who can use them are still public computers.

Read more →

Introduction Bitcoin is a digital currency that has been around since 2008 but was released in 2009. Recently, it has been gaining popularity because of the increasing number of merchants that are accepting bitcoins as a form of payment. Current Bitcoin exchange rate to USD is off the charts and is still climbing higher. How Hackers Use Your Website For BitCoin Mining? One of the ThreatSign customers has recently asked us to monitor their website as they were experiencing high CPU usage.

Read more →

This is not just another phishing attack blog. This is about your business’ well-being should your website be compromised. This about hosting providers who may inadvertently allow multiple client’s websites to be compromised simultaneously, thereby putting their own business at risk. This is about protecting reputations and maintaining accessibility to your website or to the websites that you host. Janet Evans is an American swimmer who won four Olympic gold medals and one silver medal.

Read more →

Ransomware Cyber-Attack Threat A continually improving ransomware attacks is a challenge that IT companies, online businesses, health trusts and even governments are facing. In a short-term, ransomware infection blocks access to essential files on computer or server for weeks and months. Such cyber security incident is dangerous for daily business operation knocking out successful businesses until the hacking recovery. While in long-term, ransomware infection has severe consequences striking business's reputation and leading to commercial and financial collapse.

Read more →

Malware clean-up and hacking recovery for websites

Get your website cleaned and removed from blacklists. Prevent traffic loss and protect your visitors now.

economy

119$

/yr

1 domain
Blacklisting removal
Malware clean-up
Daily malware scanning
Malware scan reports by email
Re-scan anytime
Create Account
professional

399$

/yr

5 domains
Blacklisting removal
Malware clean-up
Daily malware scanning
Malware scan reports by email
Re-scan anytime
Create Account

more plans

Need help? contactus@quttera.com

Newsletter

Join our mailing list to receive free email updates