I'm experiencing this problem today with our webmail URL. I ran a scan at quttera.com which reported the following as suspicious:
/mobile/Scripts/jquerymobile.js
[[me==="title")b.document.title=d.title;}catch(a){}};};h.stop=n;t=function(){returne(b.location.href);};k=function(g,c){vare=b.document,h=a.fn[f].domain;if(g!==c)e.title=d.title,e.open(),h%26%26e.write('<script>document.domain="'+h+'"<\/script>'),e.close(),b.location.hash=g;};}();returnh;}();})(jQuery,this);(function(a,c){if(a.cleanData){varb=a.cleanData;a.cleanData=function(f){for(vard=0,g;(g=f[d])!=null;d++)a(g).triggerHandler("remove");b(f);};}else{vare=a.fn.remove;a.fn.remove=]]
I'm just wondering if SmarterTools can confirm this is their code and not an injection? I suppose I could install a separate version and compare, but would like to save the hassle if possible.