Phishing and keyloggers
I take a peak at phishing Web sites every so often, just to see what they are up to, I do not recommend that you do the same unless you are using a system that is well protected.
Anyway, after having an arms length peak at a particular phish site I decided to see what else I could find - silly phisher, to leave his site so open to examination. Have a look at what I found - the presence of a keylogger in the root of a phishing Web site just screams DANGER!!, doesn't it.
The version of Apache being used, 2.0.54, is an older version that is long since superseded, and was originally released back in 2005.
The latest version of Apache is 2.2.4, and the Apache HTTP Project developers "strongly encourage" all users to migrate to 2.2 because only limited maintenance is performed for legacy releases. At the very least servers should be updated to 2.0.59 if the servers happen to be using add-in modules that are not compatible with 2.2. 2.0.59 is the most stable 2.0.* version, and including several securiry fixes, including an important one affecting mod_rewrite.
Security vulnerabilities - Apache:
2.2 - http://httpd.apache.org/security/vulnerabilities_22.html
2.0 - http://httpd.apache.org/security/vulnerabilities_20.html
Info about Perfectkeylogger:
CA - http://www.ca.com/us/securityadvisor/pest/pest.aspx?id=453073333
Sophos - http://www.sophos.com/security/analyses/perfectkeylogger.html