We're aware of this issue. We will update the side and remove these soon. On Fri, Jul 4, 2014 at 5:06 AM, Krzysztof Kozmic <[email protected]> wrote: > hmmm > > > Hammett, any chance you can update Wordpress to latest (there’s a file > permissions issue that stops it from happening automatically or throughout > the admin UI)? Perhaps this will make the issue go away. > > This aside, perhaps we should consider moving the website to github pages… > > > -- > Krzysztof Kozmic > > From: Tim Perry [email protected] > Reply: [email protected] > [email protected] > Date: 4 July 2014 at 5:27:53 pm > To: [email protected] > [email protected] > Subject: Re: Note to Admin - Website Malware Issue > > I'm still seeing this issue today. Additionally, if you search for 'Castle > Project' in Google, the first result looks like: > > Castle Project | Castle Project – build your .NET projects on ... > > www.castleproject.org/ > > News. December 1, 2013. Last release of where can i purchase cialis Core had > the unfortunate side-effect that one of the fixes included was susceptible > to ... > > I think there's malicious scripts on the site itself, rewriting some of the > content, and that's what AVG is blocking. > > On Wednesday, 2 April 2014 21:35:35 UTC+1, Mauricio Scheffer wrote: >> >> I don't think black-hat SEO is malware, at all. Their description ( >> http://www.avgthreatlabs.com/virus-and-malware-information/info/blackhat-seo/ >> ) seems incorrect. >> Here's a better definition: >> http://www.webopedia.com/TERM/B/Black_Hat_SEO.html . Black-hat SEO is >> targeted at search engines, so it has little to no impact (and certainly not >> harmful) for users. >> >> Also, if you check the comments you'll see that someone got one of these >> warnings from browsing bing.com. So it looks like a bug in AVG. >> >> That said, the alert is probably triggered by a couple of script blocks >> that use document.write, which don't seem to be doing anything, so they >> might as well be removed. >> >> Cheers >> >> >> >> >> -- >> Mauricio >> >> >> On Wed, Apr 2, 2014 at 12:51 PM, Stephen Wicklund <[email protected]> >> wrote: >>> >>> While navigating to the main site, castleproject.org, I got an AVG popup >>> saying it removed a "Blackhat SEO" exploit. >>> >>> Here's the info page the popup linked me to: >>> http://www.avgthreatlabs.com/website-safety-reports/domain/castleproject.org/linkreport/www.castleproject.org%252F/?utm_source=TDPU&utm_medium=OS >>> >>> It seems someone has injected the malicious code by some means into your >>> website, as the warning/malware-removed-popup shows up on each subpage as I >>> navigate to it. >>> -- >>> You received this message because you are subscribed to the Google Groups >>> "Castle Project Users" group. >>> To unsubscribe from this group and stop receiving emails from it, send an >>> email to [email protected]. >>> To post to this group, send email to [email protected]. >>> Visit this group at http://groups.google.com/group/castle-project-users. >>> For more options, visit https://groups.google.com/d/optout. >> >> > -- > You received this message because you are subscribed to the Google Groups > "Castle Project Users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > To post to this group, send email to [email protected]. > Visit this group at http://groups.google.com/group/castle-project-users. > For more options, visit https://groups.google.com/d/optout.
-- Cheers, hammett http://www.d-collab.com/ http://www.hammettblog.com/ -- You received this message because you are subscribed to the Google Groups "Castle Project Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/castle-project-users. For more options, visit https://groups.google.com/d/optout.
