• May 19, 2018

    Threat

    Blacklist
    The URL, website or domain is marked as unsafe by Comodo analysts or by a trusted external source (such as Google Safe Browsing).

    Phishing
    Phishing is the act of attempting to obtain authentication information, credit card details or other personal account information via masquerading as a trustworthy entity (such as a bank). The URL or website is marked as containing phishing content by Comodo analysts or an trusted external source (such as Google Safe Browsing or PhishTank).

    Malware Downloads
    The scanned URL is a direct link to a malware file or contains links to malware files. If these are executed by the user they may cause infection.

    Drive-by-Downloads
    A drive-by download attack means the user may be infected just by visiting the malicious web page in a browser without any further user actions.

    Worms
    A worm is a type of malware which replicates itself in order to spread to other computers. It usually attempts to spread via a network system and normally does not corrupt or modify files on an infected system.

    Backdoors
    A backdoor is a type of malware which bypasses normal authentication and allows illegal access to a computer. It may be used to obtain personal information and to control the computer system remotely.

    Trojans
    A trojan is a type of malware which poses as legitimate software but once installed performs malicious actions.

    Suspicious Iframes
    Suspicious iframes are ifames on legitimate web servers which have been injected and contain links to malicious content (exploit packs, redirectors etc).

    Heuristic Viruses
    A heuristic virus is a type of malware which may be detected by its behavior.

    Suspicious Code
    Suspicious code detected. This may mean the scanned page has been compromised and contains suspicious code.

    Suspicious Connections
    Active connections are automatically (iframes, java scripts) made to suspicious URL’s of other websites.

    Suspicious Activity
    Suspicious activity is detected during dynamic analysis of the URL. Actions which may identify attacks (large memory allocation, browser crashing, calling functions in an attempt to exploit vulnerabilities) are detected.



เวอไนน์ไอคอร์ส

ประหยัดเวลากว่า 100 เท่า!






เวอไนน์เว็บไซต์⚡️
สร้างเว็บไซต์ ดูแลเว็บไซต์

Categories