
blog.gdatasoftware.com/2014/10/23942-new-frameworkpos-variant-exfiltrates-data-via-dns-requests
Preview meta tags from the blog.gdatasoftware.com website.
Linked Hostnames
10- 25 links toblog.gdatasoftware.com
- 2 links towww.gdata.de
- 1 link toblog.trendmicro.com
- 1 link tode.linkedin.com
- 1 link tofeeds.feedblitz.com
- 1 link tokrebsonsecurity.com
- 1 link towww.facebook.com
- 1 link towww.instagram.com
General Meta Tags
17- titleNew FrameworkPOS variant exfiltrates data via DNS requests
- charsetutf-8
- x-ua-compatibleIE=edge
- generatorTYPO3 CMS
- viewportwidth=device-width, initial-scale=1
Twitter Meta Tags
1- twitter:cardsummary
Link Tags
15- alternatehttps://feeds.feedblitz.com/GDataSecurityBlog-DE&x=1
- alternatehttps://feeds.feedblitz.com/GDataSecurityBlog-EN&x=1
- apple-touch-icon/apple-touch-icon.png
- canonicalhttps://www.gdatasoftware.com/blog/2014/10/23942-new-frameworkpos-variant-exfiltrates-data-via-dns-requests
- dns-prefetch//file.gdatasoftware.com
Links
35- http://blog.trendmicro.com/trendlabs-security-intelligence/new-blackpos-malware-emerges-in-the-wild-targets-retail-accounts
- http://krebsonsecurity.com/2014/09/home-depot-56m-cards-impacted-malware-contained
- https://blog.gdatasoftware.com
- https://blog.gdatasoftware.com/about-g-data
- https://blog.gdatasoftware.com/about-g-data/awards