See: http://urlquery.net/report.php?id=1417905014578
Nothing here: http://www.dnsinspect.com/naylors.com/1417905208
Code hick-up: wXw.naylors.com/media/js/3f7ee49a4b207c7d8f5074bd31ad4ad4.js benign
[nothing detected] (script) wXw.naylors.com/media/js/3f7ee49a4b207c7d8f5074bd31ad4ad4.js
status: (referer=wXw.naylors.com/)saved 9499 bytes 05f96c042e8f840e9b810fbd4c58fd7d0af35a3f
info: [decodingLevel=0] found JavaScript
suspicious: maxruntime exceeded
IDS alert notifying that likely malicious instructions are injected into Explorer - mail spam: Spam contains Malware - remote code exploit:-
ALERT: ETPRO WEB_CLIENT Microsoft Internet Explorer remote code execution via option element (Suricata /w Emerging Threats Pro:Severity 1;
or denoting Social PHISHing - the alert for a MS vulnerability from 2011 now has been patched as far as we are aware.
polonus