Website with conditional redirects SE visitors redirected...

See: http://killmalware.com/psginvestments.com/#
See the code: https://aw-snap.info/file-viewer/?tgt=http%3A%2F%2Fpsginvestments.com%2F&ref_sel=GSP2&ua_sel=ff&fs=1
jQuery libraries to be retired: Detected libraries:
jquery - 1.2.6 : (active1) -http://www.cibonline.org/plugins/system/cd_scriptegrator/utils/js/jquery/jquery-latest.pack.js.php
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.2.6 : (active1) -http://www.cibonline.org/plugins/system/cd_scriptegrator/utils/js/jquery/jquery-latest.pack.js.php
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
2 vulnerable libraries detected

This link on website has ill web rep: https://www.mywot.com/en/scorecard/www.cibonline.org
and is Google Safebrowsing blacklisted.

polonus