{"id":1832,"date":"2008-07-17T17:22:00","date_gmt":"2008-07-17T17:22:00","guid":{"rendered":"http:\/\/www.hothardware.com\/News\/Websites_Slow_to_Clean_Up_Malware_Infection"},"modified":"2008-07-17T17:22:00","modified_gmt":"2008-07-17T17:22:00","slug":"websites-slow-to-clean-up-malware-infection","status":"publish","type":"post","link":"https:\/\/computerhunter.us\/?p=1832","title":{"rendered":"Websites Slow to Clean Up Malware Infection"},"content":{"rendered":"<p>Security company Finjan recently proclaimed that it detected over 1,000 different Website domains had been compromised during the first two months of June by a known malware toolkit, &#8220;Asprox,&#8221; which has been around for over a year (according to Symantec).\u00a0&#8220;\u2026 a new round of mass Web attacks has started during May 2008. Hackers successfully compromised a large number of government and top businesses websites worldwide to infect visitors with malware. The attack toolkit being used (which is aliased as &#8220;Asprox&#8221;)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security company Finjan recently proclaimed that it detected over 1,000 different Website domains had been compromised during the first two months of June by a known malware toolkit, &#8220;Asprox,&#8221; which has been around for over a year (according to Symantec).\u00a0&#8220;\u2026 a new round of mass Web attacks has started during May 2008. Hackers successfully compromised a large number of government and top businesses websites worldwide to infect visitors with malware. The attack toolkit being used (which is aliased as &#8220;Asprox&#8221;) <a href=\"https:\/\/computerhunter.us\/?p=1832\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-1832","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/1832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1832"}],"version-history":[{"count":0,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/1832\/revisions"}],"wp:attachment":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}