Re: http://killmalware.com/pogoworld.co.uk/#
But mentioned
<body background="http://transporteszeus.com/js/8bcddb025c198469b967c7451ba80e1d.jpg.png" oncontextmenu="return false" onkeydown="return false"><!-- BEGIN AV_TOOLBAR -->
<script type="text/javascript">
missed here: http://killmalware.com/www.transporteszeus.com/#
→ http://www.webdataexperts.com/domain/transporteszeus.com & http://www.domaintuno.com/d/transporteszeus.com
& https://www.virustotal.com/en-gb/domain/www.transporteszeus.com/information/
Missed also here: https://sitecheck.sucuri.net/results/www.transporteszeus.com
Hacked: http://toolbar.netcraft.com/site_report?url=http://www.pogoworld.co.uk
See the excessive server info proliferation: http://static.askapache.com/hacking/nessus-plugins/www_fingerprinting_hmap.nasl Vulnerable to Remote Overflow Exploit:
http://www.cvedetails.com/vulnerability-list/vendor_id-45/product_id-66/version_id-11961/opov-1/Apache-Http-Server-1.3.28.html
pol