Last month, eight sites at once well-known anti-virus solutions avast!  Were defaces:

http://2.bp.blogspot.com/_eY5lQb30XpY/S4Ac8e9asZI/AAAAAAAAAuk/5dXk9I3GQPk/s320/deface_avast.jpg

http://www.avast.co.za/ (mirror; date: 2010-01-22 15:06:28)
http://awast.org/ (mirror; date: 2010-02-18 18:57:27)
http://www.avast.de/ (mirror; date: 2010-02-18 18:58:01)
http://shop.avast.de/ (mirror; date: 2010-02-18 18:58:24)
http://www2.avast.de/ (mirror; date: 2010-02-18 18:59:51)
http://partner.avast.de/ (mirror; date: 2010-02-18 19:03:59)
http://demoshop.avast.de/ (mirror; date: 2010-02-18 19:03:14)
http://forum.avast.de/ (mirror; date: 2010-02-18 19:01:33)

Breaking these sites was done by a group of hackers “HcJ & Cyb3R-1sT”, on account of which a successful break sites and other equally popular antivirus vendors:

ESET

https: / / www.eset-antivirus.de/ (mirror; date: 2009-12-21 00:35:55)
https: / / www.datsec.de/ (mirror; date: 2009-12-20 22:50:05)
https: / / www.esetantivirus.de/ (mirror; date: 2009-12-21 00:32:02)
http://www.eset.de/ (mirror; date: 2009-12-20 22:47:52)
https: / / www.esetsoftware.de/ (mirror; date: 2009-12-18 00:22:21)
https: / / www.nod32.de/ (mirror; date: 2009-12-18 00:21:24)
http://getnod32.com/ (mirror; date: 2009-12-12 00:47:18)
http://nod-32.eu/ (mirror; date: 2009-11-30 01:48:52)
http://partners.nod32.bg/ (mirror; date: 2009-10-04 01:52:36)

Panda Security

http://duvidas.pandasecurity.com.br/ (mirror; date: 2009-12-13 11:43:54)
http://download.pandasecurity.com.br/ (mirror; date: 2009-12-10 20:56:17)
http://press.pandasecurity.com.br/ (mirror; date: 2009-12-10 20:56:38)
http://intranet.pandasecurity.com.br/ (mirror; date: 2009-12-10 20:57:11)

F-Secure

http://ativacao.f-secure.com.br/ (mirror; date: 2009-12-23 14:21:20)
http://fsecure.com.br/ (mirror; date: 2009-12-23 14:48:51)
http://f-secure.com.br/ (mirror; date: 2009-12-13 21:28:12)

bitdefender

http://www.bitdefenderthailand.com/ (mirror; date: 2009-12-26 02:45:15)
http://bitnet.com.hr/ (mirror; date: 2009-12-09 23:26:53)

Avast (additionally:))

http://avast.se/ (mirror; date: 2009-12-10 15:38:19)

After walking on mirrors defaces start involuntarily thinking, and whether it is worth trusting distribution antivirus solutions have just downloaded from the official site of the manufacturer? But back to the topic of fasting.

It was interesting to know, the adequacy (and efficiency) of protective measures taken after the incidents occurred on the sites of avast!.So, armed with the most advanced hacker tool called a browser, I made the transition to the site www.avast.co.za (first in the list) and …

This time is more than sufficient to detect and eliminate the most dangerous and common vulnerabilities Web.  But as we see not all are ready to learn from the first time …

Source: www.zone-h.org

Explore More

Twitter accounts hacked : Barack Obama, Britney etc on the list

According to twitter, a micro blogging site, 33 twitter accounts were compromised and false and inappropriate messages were posted online. Hacked accounts include prominent twitter sources like President-elect Barack Obama,

Bruter version 1.0

Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety

25 per cent of new worms designed to spread via USB

48 per cent of SMBs are infected by worms each year according to a report published by security vendor PandaLabs. The Second International SMB Security Barometer report (PDF here) surveyed