Ars Technica used in malware campaign with never-before-seen obfuscation — Buried in URL was a string of characters that appeared to be random, but were actually a payload::Vimeo also used by legitimate user who posted booby-trapped content.
You must log in or register to comment.
Ars Technica compromised. Come read the story at Ars Technica!
It’s also not clear that any Ars users visited the about page.
Are weblogs not a thing? They should be able to tell how many times that page was accessed and by whom with a single query.