There is an on-line contact form, http://www.avast.com/contact-form.php?loadStyles for: * Sales inquiries; Technical issues; Website issues; Report false virus alert in file; Report false virus alert on website; Undetected Malware; Press (Media), issues.
If you are reporting an FP, then you get another input field open, enter the web URL for the site you wish to submit for review, etc. A link to this topic also wouldn’t hurt.
Please break that link there (hxtp or wXw), because site is still given as URL:Mal site by the Avst Network Shield.
IP has been found to have been infected with PHP/Shell.CA.2 and PHP/Spy.Bull malware, now dead.
IP also known as a PHISH. Site given suspicious here: http://urlquery.net/report.php?id=42379
Full System Info is given out, like the full Apache version forms a risk, PHP/5.3.8 installed there has multiple vulnerabilities which could lead to hacks,
AS Name: CANACA-210 - Canaca-com Inc. This AS has 65 Blacklisted URLs which are malcious and have badware,
well, what do I can do for fix this problem? why only with this subdomain have this problem? when I navigate in midixtones.net and another sobdomains of midixtones.net, all is fine, nothing happens with Avast Netkorks Shield thing, I contacted avast using the contact form like DavidR wrote and im still with the issue
well, what do I can do for fix this problem? why only with this subdomain have this problem? when I navigate in midixtones.net and another sobdomains of midixtones.net, all is fine, nothing happens with Avast Netkorks Shield thing,
I dont know what relation have avast with http://zulu.zscaler.com, but I fixed the issue with zscaler.com and immediately the problem with avast was solved too (I guess that).
And just I renamed a file name for solve it :o
so, do you can notice to me if avast stills blocking my website or just for me is fixed?
Thank you for your kind words. Yes updating, patching and scanning against vulnerabilities is the main task of the webmaster that not only has the security of his website at heart but also that of the potential visitors there. From being active here I found that a lot of these mass infections of webmails will take place because of vulnerabilities that could have been prevented or whenever cleansed would lead to re-infection. In a lot of cases infection has been made very, very easy for the malcreants and is performed via automated tools like. Read what Clinton Kar (link article author) writes on Media Contact: - http://investors.imperva.com/phoenix.zhtml?c=247116&p=irol-newsArticle&ID=1686235&highlight=