<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://www.stopbadware.org"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>StopBadware blogs</title>
 <link>https://www.stopbadware.org/blog</link>
 <description></description>
 <language>en</language>
<item>
 <title>Highlights from five years of StopBadware work</title>
 <link>https://www.stopbadware.org/blog/2015/09/16/highlights-from-five-years-of-stopbadware-work</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;The Cambridge-based StopBadware team is signing off this week after more than five years of community building and collaboration with some of the best people in the security business. As we &lt;a href=&quot;https://www.stopbadware.org/blog/2015/08/20/whats-next-for-stopbadware-in-tulsa&quot;&gt;turn full operations over&lt;/a&gt; to Dr. Tyler Moore and his excellent team at the University of Tulsa, take a look at some of the highlights of our work these past five-plus years. &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder=&quot;0&quot; height=&quot;510&quot; src=&quot;https://docs.google.com/document/d/1I_1DWO6ZlVqec9Y_HXbAoF3o7fa41Gvc6G9eYqUHKD0/pub?embedded=true&quot; style=&quot;border-width:0&quot; width=&quot;660&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/stopbadware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Wed, 16 Sep 2015 15:31:24 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">2031 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/09/16/highlights-from-five-years-of-stopbadware-work#comments</comments>
</item>
<item>
 <title>What&#039;s next for StopBadware in Tulsa</title>
 <link>https://www.stopbadware.org/blog/2015/08/20/whats-next-for-stopbadware-in-tulsa</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;&lt;em&gt;We asked Tyler Moore, StopBadware&#039;s research advisor and the boffin who&#039;s taking over our core operations, to expand on his plans for the organization in Tulsa and to throw in some 90s references. He obliged. &lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;
	Dr. Tyler Moore on the new version of StopBadware&lt;/h3&gt;
&lt;p&gt;Recently we &lt;a href=&quot;https://www.stopbadware.org/blog/2015/06/25/stopbadware-transferring-operations-to-university-of-tulsa&quot;&gt;announced&lt;/a&gt; that StopBadware is transferring operations to the University of Tulsa. In today&#039;s blog post I will fill in some more details on this exciting new chapter of the organization. Some things will change as a result, but our non-profit mission to make the web safer will remain.&lt;/p&gt;
&lt;p&gt;First, let me tell you a bit about myself and my history with StopBadware, which I hope will go a long way to help solve the mystery of how StopBadware has ended up in Tulsa. (Hint: it&#039;s not because of &lt;a href=&quot;https://www.youtube.com/watch?v=NHozn0YXAeE&quot;&gt;Hanson&lt;/a&gt;. And I promise the circumstances are happier than when Chandler was transferred there after &lt;a href=&quot;https://www.youtube.com/watch?v=QEBo_V-b9Ik&quot;&gt;sleeping in a meeting on Friends&lt;/a&gt;.)&lt;/p&gt;
&lt;p&gt;I first began interacting with StopBadware in 2008 while I was a postdoctoral fellow at Harvard&#039;s &lt;a href=&quot;http://crcs.seas.harvard.edu&quot;&gt;Center for Research on Computation and Society&lt;/a&gt;. I wanted to engage with StopBadware due to my research interests in cybercrime measurement. We collaborated on several projects, one of which culminated in &lt;a href=&quot;http://lyle.smu.edu/~tylerm/cset12.pdf&quot;&gt;a 2012 paper&lt;/a&gt; describing an experiment that demonstrated the impact of transmitting detailed notices in cleaning up websites distributing malware. The paper was co-authored by &lt;a href=&quot;http://lyle.smu.edu/~mvasek/&quot;&gt;Marie Vasek&lt;/a&gt;, who is now my Ph.D student and Research Scientist at StopBadware.&lt;/p&gt;
&lt;p&gt;Since 2013, StopBadware has been closely collaborating with my research team under Marie&#039;s supervision. The website testing intern has regularly been an undergraduate student I have recruited from my courses. Last year, I became StopBadware&#039;s research advisor, further formalizing my long-term involvement with the organization.&lt;/p&gt;
&lt;p&gt;When StopBadware&#039;s &lt;a href=&quot;/board&quot;&gt;board of directors&lt;/a&gt; decided earlier this year to move away from being a stand-alone 501c3 non-profit organization, I volunteered to bring StopBadware back to its roots in academia. StopBadware will become a program operating within the Security Economics Laboratory at the Tandy School of Computer Science at the University of Tulsa, where I cut my teeth as an undergraduate security researcher and where I recently joined the faculty.&lt;/p&gt;
&lt;p&gt;This change in organization will bring several benefits. One is that it should greatly reduce operating costs, as I will be serving as Director pro bono, and we can share other overheads with an existing institution. Another is that we will be able to continue to serve as a true non-profit—something that in the eyes of staff and community is both unique and essential in this space.&lt;/p&gt;
&lt;p&gt;The new StopBadware will concentrate on the core competencies that we offer. First, we will continue the testing and &lt;a href=&quot;/request-review&quot;&gt;review program&lt;/a&gt;, in which anyone can request independent review of URLs blacklisted for malware by StopBadware&#039;s data providers. Second, we will continue the &lt;a href=&quot;/data-sharing&quot;&gt;Data Sharing Program&lt;/a&gt; (DSP), in which StopBadware serves as a trusted broker for community-contributed feeds of security datasets. Third, StopBadware&#039;s research mission will be expanded. We plan to more extensively mine the data contributed to the DSP and other sources. Finally, we intend to greatly expand the publication of data related to web-based badware. Our aim is to provide even greater transparency into the fight against web-based malware, so that we might more accurately track progress, highlight accomplishments and encourage improvements on part of the community.&lt;/p&gt;
&lt;p&gt;We still need your help, in terms of contributing data, services and financial assistance. Donations will still be required in order for StopBadware to continue thriving in the years ahead. If you are interested in supporting StopBadware as we move onto the next chapter, please get in touch by emailing me at &lt;a href=&quot;mailto:tyler@stopbadware.org&quot;&gt;tyler@stopbadware.org&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;- Tyler&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/stopbadware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/stopbadware-news&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware news&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Thu, 20 Aug 2015 20:27:13 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">2021 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/08/20/whats-next-for-stopbadware-in-tulsa#comments</comments>
</item>
<item>
 <title>Visualizing eight years of independent reviews</title>
 <link>https://www.stopbadware.org/blog/2015/08/14/visualizing-eight-years-of-independent-reviews</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;StopBadware has been performing independent reviews of websites blacklisted by our data providers for more than eight years. As we&#039;ve explained in the past, a manual review done by our staff is not always necessary: if a webmaster requests a StopBadware review of a site on Google&#039;s Safe Browsing blacklist, the first step in our review process is an automated request for Google to rescan the site in search of malicious code. If Google&#039;s automated systems don&#039;t find anything suspicious, that site will come off Google&#039;s blacklist without our ever having to touch it. When Google still finds malware, or when one of our other data providers is the blacklisting party, one of our website testing team uses a variety of tools to scour the site for malicious code and other bad behavior.&lt;/p&gt;
&lt;p&gt;As our home page proclaims in red, we&#039;ve helped de-blacklist more than 171,000 websites since 2007. Before we &lt;a href=&quot;https://www.stopbadware.org/blog/2015/06/25/stopbadware-transferring-operations-to-university-of-tulsa&quot;&gt;shutter operations as an independent nonprofit&lt;/a&gt; next month, we want to give our community a better idea of what goes into that number. &lt;/p&gt;
&lt;p&gt;Since we started collaborating with Google, and later ThreatTrack Security and NSFocus, we&#039;ve performed 53,167 manual reviews. We&#039;ve also processed an additional 188,149 review requests that were resolved automatically thanks to our automated integration with Google. Those aren&#039;t all unique requests, so combining them doesn&#039;t yield an accurate number. Here&#039;s what all those review requests look like over time:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://s3.amazonaws.com/sbworg/SBWreviewsovertime.png&quot; style=&quot;width: 660px; height: 211px;&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;
	Why the decline? &lt;/h3&gt;
&lt;p&gt;You&#039;ll undoubtedly notice that we received many more review requests early on than we do today. Better security awareness, wide availability of relatively low-cost security tools, and default use of things like Webmaster Tools all contribute to the decline we&#039;ve experienced in review requests. We also have better ways of detecting and weeding out abusive requests than we used to. &lt;/p&gt;
&lt;p&gt;Unfortunately, something else that&#039;s contributed to the decline in review requests is malware distributors&#039; widescale use of stealthier, more targeted methods like malvertising. When a resource is compromised only very briefly (e.g., through an infected ad network), even when blacklist operators are able to detect the infection and warn users away, the compromise is often resolved too quickly for StopBadware&#039;s &lt;a href=&quot;/clearinghouse/search&quot;&gt;Clearinghouse&lt;/a&gt; to reflect that the resource was ever blacklisted. Generally speaking, if something is blacklisted for fewer than six hours, we won&#039;t have a record of it in our Clearinghouse. On the one hand, this is good news, in that we want blacklists to operate as narrowly as possible to maximize user protection while minimizing penalty to site owners; on the other hand, this is bad news, in that malicious actors are able to effectively utilize powerful technologies to spread malware in ways that are difficult to detect and counter. &lt;/p&gt;
&lt;h3&gt;
	What&#039;s not included in this data? &lt;/h3&gt;
&lt;p&gt;What you don&#039;t see in this chart is the tens of thousands of URLs we&#039;ve reviewed in bulk for web hosting providers, AS operators, and other network providers over the years. We&#039;ve worked with everyone from dynamic DNS companies and bulk subdomain providers to small resellers and abuse departments at big companies to clean up malicious resources on their networks and help remove them from blacklists. The majority of this process is manual, and because it&#039;s initiated based on trust and human communication instead of by clicking a button, bulk review data isn&#039;t reflected in our public review data. &lt;/p&gt;
&lt;p&gt;StopBadware&#039;s &lt;a href=&quot;/request-review&quot;&gt;review process&lt;/a&gt; will continue to operate normally during and after our operations transfer to our research team at the University of Tulsa. Thanks to our research scientist, Marie Vasek, for putting this data together!&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/stopbadware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/malware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;malware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;security&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/review-data&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;review data&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Fri, 14 Aug 2015 16:24:40 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">2011 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/08/14/visualizing-eight-years-of-independent-reviews#comments</comments>
</item>
<item>
 <title>StopBadware transferring operations to University of Tulsa</title>
 <link>https://www.stopbadware.org/blog/2015/06/25/stopbadware-transferring-operations-to-university-of-tulsa</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p dir=&quot;ltr&quot;&gt;In 2006, Harvard’s Berkman Center introduced a new project: &lt;a href=&quot;http://cyber.law.harvard.edu/wg_home/newsroom/pressreleases/stopbadware_launch&quot;&gt;StopBadware.org&lt;/a&gt;, a collective effort to protect consumers from bad software and expose the people who profited from it. StopBadware was to be a collaboration between the academic community and leading technology companies, a force for transparency and openness in an increasingly siloed online environment, and a haven for users seeking information about bad software and malicious websites. The project was backed by Internet pioneers in both business and academia: founders Jonathan Zittrain and John Palfrey, advisers Vint Cerf and Esther Dyson, supporting companies including Google and Lenovo. From its first day, StopBadware was a collaboration intended to demonstrate the full promise of the Internet by protecting and expanding user choice.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;After almost a decade of collaborative work and more than five years as a standalone nonprofit, StopBadware is shutting down operations as an independent organization and transferring core programs to the University of Tulsa, where they’ll be run by our longtime research adviser, &lt;a href=&quot;http://lyle.smu.edu/~tylerm/&quot;&gt;Dr. Tyler Moore&lt;/a&gt;. This decision rested upon two pillars: the unpredictability of long-term funding prospects and the strength of our ties to the research community. Ultimately, StopBadware’s board and staff agreed that our mission is better served by re-establishing roots in academia under the capable guidance of Dr. Moore and his team.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The programs we expect to transfer to Tulsa include our independent review process, the StopBadware Data Sharing Program, and maintenance of informational resources and searchable Clearinghouse.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;What does this mean in practical terms?&lt;/p&gt;
&lt;ul dir=&quot;ltr&quot;&gt;&lt;li&gt;
		Users and webmasters will still be able to look up URLs, IPs, and ASNs in our &lt;a href=&quot;/clearinghouse/search&quot;&gt;Clearinghouse&lt;/a&gt; and &lt;a href=&quot;/report-badware&quot;&gt;report malicious URLs&lt;/a&gt; to our community feed.&lt;/li&gt;
	&lt;li&gt;
		Website owners whose resources are blacklisted by one or more of our data providers will still be able to &lt;a href=&quot;https://www.stopbadware.org/request-review&quot;&gt;request an independent review&lt;/a&gt; from StopBadware.&lt;/li&gt;
	&lt;li&gt;
		Technology companies, independent security researchers, and academic institutions will still be able to contribute malware data feeds to StopBadware’s &lt;a href=&quot;/data-sharing&quot;&gt;data sharing program&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;
		StopBadware’s shared and proprietary data will still be used to facilitate research on cybercrime and the security ecosystem.&lt;/li&gt;
	&lt;li&gt;
		Users who encounter browser or search warnings about malware websites will still be able to reach StopBadware information about badware and how to protect their computers.&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;StopBadware’s Boston-based office and staff will cease operation by September, as will our current &lt;a href=&quot;/board&quot;&gt;board of directors&lt;/a&gt;. Over the next few months, we’ll also be shutting down the &lt;a href=&quot;/partners&quot;&gt;StopBadware Partner&lt;/a&gt; program and the &lt;a href=&quot;/we-stop-badware&quot;&gt;We Stop Badware™&lt;/a&gt; Web Host program in order to let the incoming team in Tulsa focus on the review process, data sharing program, and research projects. The StopBadware Board and outgoing staff have known Tyler Moore since our early days as a Berkman Center project; we have the utmost confidence in his vision and unflagging dedication to StopBadware’s mission.&lt;/p&gt;
&lt;p&gt;Over the next two months, we’ll be painting a bigger picture for our community to illustrate StopBadware’s accomplishments, both as an independent nonprofit and as a decade-old project in collaborative security. We’ll also turn our blog over to Dr. Moore part-time so he can expound upon his plans for the new iteration of StopBadware. Like many other good Internet citizens, we welcome the future!&lt;/p&gt;
&lt;p&gt;- The StopBadware team&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/stopbadware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Thu, 25 Jun 2015 14:01:36 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">2001 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/06/25/stopbadware-transferring-operations-to-university-of-tulsa#comments</comments>
</item>
<item>
 <title>Community news and analysis: May 2015</title>
 <link>https://www.stopbadware.org/blog/2015/06/09/community-news-and-analysis-may-2015</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	Featured news&lt;/h4&gt;
&lt;ul dir=&quot;ltr&quot;&gt;&lt;li&gt;
		How effective are the security questions—and answers—used to protect sensitive accounts and information? Not very, according to &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/05/new-research-some-tough-questions-for.html&quot;&gt;new Google research&lt;/a&gt;. Read about how easy it is for hackers and bots to guess answers to common questions, and what users can do about it.&lt;/li&gt;
	&lt;li&gt;
		Google also published research last month on the ad injection economy (key findings &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/05/new-research-ad-injection-economy.html&quot;&gt;here&lt;/a&gt;, full report &lt;a href=&quot;http://research.google.com/pubs/pub43346.html&quot;&gt;here&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;
		Mozilla &lt;a href=&quot;https://blog.mozilla.org/security/2015/05/12/may-2015-ca-communication/&quot;&gt;sent a communication&lt;/a&gt; to CAs with root certificates included in Mozilla’s program; Mozilla, acting in the best interest of users, asked CAs to respond to five action items. They’ve stated they intend to publish the responses this month.&lt;/li&gt;
	&lt;li&gt;
		WordPress users: The Automattic team &lt;a href=&quot;https://wordpress.org/news/2015/05/wordpress-4-2-2/&quot;&gt;released WordPress 4.2.2&lt;/a&gt;, featuring critical security fixes, the first week of May. Please make sure you’re updated!&lt;/li&gt;
	&lt;li&gt;
		DomainTools put together their first report profiling malicious domains by delving into domain registration attributes and overlaying this with data on malicious activity. Their summary links to the full report &lt;a href=&quot;http://blog.domaintools.com/2015/05/profiling-malicious-domains-in-the-domaintools-report/&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	Malware news + analysis&lt;/h4&gt;
&lt;ul dir=&quot;ltr&quot;&gt;&lt;li&gt;
		&lt;a href=&quot;http://www.welivesecurity.com/2015/05/07/cpl-malware-brazil-white-paper-now-available/&quot;&gt;ESET&lt;/a&gt;: Whitepaper on CPL malware in Brazil&lt;/li&gt;
	&lt;li&gt;
		&lt;a href=&quot;https://nakedsecurity.sophos.com/2015/05/20/los-pollos-hermanos-ransomware-what-will-they-think-of-next/&quot;&gt;Sophos&lt;/a&gt;: “PolloCrypt” ransomware sounds as ridiculous as its mascots look—but it’s a real thing targeting Aussie users. Also from Sophos: Can Rombertik malware really destroy your computer? &lt;a href=&quot;https://nakedsecurity.sophos.com/2015/05/06/can-the-rombertik-malware-really-destroy-computers-no-no-three-times-no/&quot;&gt;Nope&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;
		Fortinet analyses of &lt;a href=&quot;http://blog.fortinet.com/post/rombertik-a-personal-curiosity&quot;&gt;Rombertik malware&lt;/a&gt; and &lt;a href=&quot;http://blog.fortinet.com/post/tinba-the-pied-piper-leading-your-banking-credentials-into-the-hands-of-hackers&quot;&gt;Tinba botnet malware&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;
		&lt;a href=&quot;https://blog.sucuri.net/2015/05/hacked-websites-redirect-to-bitcoin-org.html&quot;&gt;Sucuri&lt;/a&gt;: Hacked websites redirect to...Bitcoin?&lt;/li&gt;
&lt;/ul&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	Other security news&lt;/h4&gt;
&lt;ul dir=&quot;ltr&quot;&gt;&lt;li&gt;
		&lt;a href=&quot;http://blog.sitelock.com/2015/05/05/who-else-is-reading-your-email-a-guide-to-pgp-encryption/&quot;&gt;SiteLock&lt;/a&gt;: Who else is reading your email? A guide to PGP encryption&lt;/li&gt;
	&lt;li&gt;
		&lt;a href=&quot;http://blog.fortinet.com/post/should-new-who-disease-naming-guidelines-also-be-applied-to-malware&quot;&gt;Fortinet&lt;/a&gt;: Should new WHO disease-naming guidelines also be applied to malware?&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/stopbadware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/stopbadware-partners&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;StopBadware Partners&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/community-news&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;community news&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/malware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;malware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;security&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 09 Jun 2015 16:54:31 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">1991 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/06/09/community-news-and-analysis-may-2015#comments</comments>
</item>
<item>
 <title>Community news and analysis: April 2015</title>
 <link>https://www.stopbadware.org/blog/2015/05/08/community-news-and-analysis-april-2015</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	Featured news&lt;/h4&gt;
&lt;ul dir=&quot;ltr&quot;&gt;&lt;li&gt;
		Google: Safe Browsing &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/04/a-javascript-based-ddos-attack-as-seen.html&quot;&gt;insight&lt;/a&gt; into a Javascript-based DDoS attack; the &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/04/beyond-annoyance-security-risks-of.html&quot;&gt;security risks&lt;/a&gt; of unwanted ad injectors; new &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/04/protect-your-google-account-with.html&quot;&gt;Password Alert&lt;/a&gt; Chrome extension protects users from entering Google passwords into phishing sites&lt;/li&gt;
	&lt;li&gt;
		Mozilla on deprecating &lt;a href=&quot;https://blog.mozilla.org/security/2015/04/30/deprecating-non-secure-http/&quot;&gt;non-secure HTTP&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;
		&lt;a href=&quot;https://wordpress.org/news/2015/05/wordpress-4-2-2/&quot;&gt;WordPress 4.2.2&lt;/a&gt; critical security release fixes several cross-site scripting vulnerabilities. (&lt;a href=&quot;https://wordpress.org/news/2015/04/wordpress-4-2-1/&quot;&gt;4.2.1&lt;/a&gt;, another critical security release, previously fixed a widely covered cross-site scripting vulnerability in the commenting system.)&lt;/li&gt;
	&lt;li&gt;
		Looking for a different kind of case study? Our partners at Area 1 Security explore phishing...via comic book. Take a look at “&lt;a href=&quot;http://www.pineapplesparkle.com/&quot;&gt;Operation Pineapple Sparkle&lt;/a&gt;.”&lt;/li&gt;
&lt;/ul&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	Malware news + analysis&lt;/h4&gt;
&lt;ul dir=&quot;ltr&quot;&gt;&lt;li&gt;
		ESET research on the &lt;a href=&quot;http://www.welivesecurity.com/2015/04/29/unboxing-linuxmumblehard-muttering-spam-servers/&quot;&gt;Mumblehard Linux malware&lt;/a&gt; family, along with fascinating analysis of &lt;a href=&quot;http://www.welivesecurity.com/2015/04/09/operation-buhtrap/&quot;&gt;Operation Buhtrap&lt;/a&gt; aimed at Russian banks&lt;/li&gt;
	&lt;li&gt;
		Fortinet analysis of Dridex malware’s &lt;a href=&quot;http://blog.fortinet.com/post/dridex-s-macro-downloader&quot;&gt;macro downloader&lt;/a&gt;, plus a writeup on &lt;a href=&quot;http://blog.fortinet.com/post/hiding-malicious-traffic-under-the-http-404-error&quot;&gt;hiding malicious traffic&lt;/a&gt; under the HTTP 404 error&lt;/li&gt;
	&lt;li&gt;
		Sophos on &lt;a href=&quot;https://nakedsecurity.sophos.com/2015/04/20/notes-from-sophoslabs-dyreza-the-malware-that-discriminates-against-old-computers/&quot;&gt;Dyreza malware’s&lt;/a&gt; discrimination and evasion techniques&lt;/li&gt;
&lt;/ul&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	Other security news&lt;/h4&gt;
&lt;ul dir=&quot;ltr&quot;&gt;&lt;li&gt;
		Internet Identity &lt;a href=&quot;http://internetidentity.com/blog/video-putting-the-nist-cybersecurity-framework-to-work/&quot;&gt;video&lt;/a&gt;: Putting the NIST cybersecurity framework to work&lt;/li&gt;
	&lt;li&gt;
		Mozilla statements on distrusting &lt;a href=&quot;https://blog.mozilla.org/security/2015/04/02/distrusting-new-cnnic-certificates/&quot;&gt;new CNNIC&lt;/a&gt; certificates and removing &lt;a href=&quot;https://blog.mozilla.org/security/2015/04/27/removing-e-guven-ca-certificate/&quot;&gt;e-Guven CA&lt;/a&gt; certificate.&lt;/li&gt;
	&lt;li&gt;
		Advice from Automattic: “Please &lt;a href=&quot;https://en.blog.wordpress.com/2015/04/24/enhance-your-account-security/&quot;&gt;enable two-factor authentication&lt;/a&gt; for your WordPress.com account.”&lt;/li&gt;
	&lt;li&gt;
		A SiteLock &lt;a href=&quot;http://blog.sitelock.com/2015/04/17/dos-vs-ddos-one-on-one-or-one-on-many/&quot;&gt;primer&lt;/a&gt; on DoS vs DDoS attacks&lt;/li&gt;
	&lt;li&gt;
		Sophos: Five online privacy and &lt;a href=&quot;https://nakedsecurity.sophos.com/2015/04/20/5-online-privacy-and-security-tips-for-travelers/&quot;&gt;security tips&lt;/a&gt; for travelers&lt;/li&gt;
	&lt;li&gt;
		Sucuri: How to create a website &lt;a href=&quot;https://blog.sucuri.net/2015/04/how-to-create-a-website-backup-strategy.html&quot;&gt;backup strategy&lt;/a&gt;; &lt;a href=&quot;https://blog.sucuri.net/2015/04/my-website-was-blacklisted-by-google-and-distributing-email-spam.html&quot;&gt;case study&lt;/a&gt; of a website blacklisted for distributing SEO spam&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
 <pubDate>Fri, 08 May 2015 18:54:52 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">1971 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/05/08/community-news-and-analysis-april-2015#comments</comments>
</item>
<item>
 <title>Community news and analysis: March 2015</title>
 <link>https://www.stopbadware.org/blog/2015/04/13/community-news-and-analysis-march-2015</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	Featured news&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;Google cracks down on Chrome extensions that inject ads and degrade users’ browsing experiences (&lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/03/out-with-unwanted-ad-injectors.html&quot;&gt;31 March&lt;/a&gt;). Google also added information about unwanted software to their Safe Browsing API last month (&lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/03/even-more-unwanted-software-protection.html&quot;&gt;24 March&lt;/a&gt;).&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Automattic: Five ways to secure WordPress plugins (&lt;a href=&quot;http://blog.vaultpress.com/2015/03/27/five-ways-to-secure-your-wordpress-plugins/&quot;&gt;27 March&lt;/a&gt;), preventing cross-site scripting in JavaScript (&lt;a href=&quot;https://vip.wordpress.com/2015/03/25/preventing-xss-in-javascript/&quot;&gt;25 March&lt;/a&gt;), and a blind SQL injection vulnerability found in Yoast’s popular WordPress SEO plugin (&lt;a href=&quot;http://blog.vaultpress.com/2015/03/13/blind-sql-injection-vulnerability-found-in-wordpress-seo-plugin/&quot;&gt;13 March&lt;/a&gt;).&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Three cheers for open information: Check out DreamHost’s first ever &lt;a href=&quot;https://www.dreamhost.com/dreamscape/2015/03/11/2014-transparency-report/&quot;&gt;Transparency Report&lt;/a&gt;!&lt;/p&gt;
&lt;h4 dir=&quot;ltr&quot;&gt;
	Malware news&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;ESET analyses “Casper” malware used against Syrian targets and likely developed by the same group behind the Babar and Bunny malware (&lt;a href=&quot;http://www.welivesecurity.com/2015/03/05/casper-malware-babar-bunny-another-espionage-cartoon/&quot;&gt;5 March&lt;/a&gt;).&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;SiteLock demonstrates what it looks like to infect a website (&lt;a href=&quot;http://blog.sitelock.com/2015/03/19/malware-uncovered-what-infecting-a-website-actually-looks-like/&quot;&gt;19 March&lt;/a&gt;).&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Sophos on the new TeslaCrypt ransomware targeting gamers running Windows (&lt;a href=&quot;https://nakedsecurity.sophos.com/2015/03/16/teslacrypt-ransomware-attacks-gamers-all-your-files-are-belong-to-us/&quot;&gt;16 March&lt;/a&gt;) and developments in Microsoft Office malware (&lt;a href=&quot;https://nakedsecurity.sophos.com/2015/03/06/from-the-labs-new-developments-in-microsoft-office-malware/&quot;&gt;6 March&lt;/a&gt;).&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;A couple pieces of interesting Sucuri analysis: WordPress malware causes pseudo-DarkLeech infection (&lt;a href=&quot;https://blog.sucuri.net/2015/03/pseudo-darkleech-server-root-infection.html&quot;&gt;26 March&lt;/a&gt;); ‘inverted WordPress Trojan’ adds useful features along with malware (&lt;a href=&quot;https://blog.sucuri.net/2015/03/inverted-wordpress-trojan.html&quot;&gt;11 March&lt;/a&gt;).&lt;/p&gt;
&lt;h4 dir=&quot;ltr&quot;&gt;
	Other security news&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;Mozilla on memory scanning for server security (&lt;a href=&quot;https://blog.mozilla.org/security/2015/03/12/introducing-masche-memory-scanning-for-server-security/&quot;&gt;12 March&lt;/a&gt;) and revoking trust in one CNNIC intermediate certificate (&lt;a href=&quot;https://blog.mozilla.org/security/2015/03/23/revoking-trust-in-one-cnnic-intermediate-certificate/&quot;&gt;23 March&lt;/a&gt;).&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Qualys: GHOST remote code execution exploit (&lt;a href=&quot;https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/03/17/ghost-remote-code-execution-exploit&quot;&gt;17 March&lt;/a&gt;).&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Fortinet: Cross-site scripting vulnerability discovered in WordPress Photo Gallery plugin with 12 million downloads (&lt;a href=&quot;http://blog.fortinet.com/post/cross-site-scripting-vulnerability-discovered-in-wordpress-photo-gallery-plugin&quot;&gt;20 March&lt;/a&gt;).&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/community-news&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;community news&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/stopbadware-partners&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;StopBadware Partners&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/malware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;malware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/security-news&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;security news&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Mon, 13 Apr 2015 16:11:49 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">1961 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/04/13/community-news-and-analysis-march-2015#comments</comments>
</item>
<item>
 <title>Community news and analysis: February 2015</title>
 <link>https://www.stopbadware.org/blog/2015/03/03/community-news-and-analysis-february-2015</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	Featured news: Superfish, new malware warnings, universal SSL&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;Read Mozilla’s directions for getting Superfish out of Firefox (&lt;a href=&quot;https://blog.mozilla.org/security/2015/02/27/getting-superfish-out-of-firefox/&quot;&gt;Feb. 27&lt;/a&gt;), Sophos on Superfish removal (&lt;a href=&quot;https://nakedsecurity.sophos.com/2015/02/20/how-to-get-rid-of-the-lenovo-superfish-adware/&quot;&gt;Feb. 20&lt;/a&gt;), and a Fortinet Superfish FAQ. (&lt;a href=&quot;http://blog.fortinet.com/post/superfish-faq-adware-shipped-with-lenovo-customer-laptops&quot;&gt;Feb. 20&lt;/a&gt;) ESET also has a wise piece on unwarranted panic and false positives. (&lt;a href=&quot;http://www.welivesecurity.com/2015/02/20/lenovo-superfish-dont-panic-may-affected/&quot;&gt;Feb. 20&lt;/a&gt;) Note: We hope we don’t ever have to write the word “Superfish” again.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Google Safe Browsing expands Chrome warnings: New warnings let users know when they’re about to visit a site known for encouraging downloads of unwanted or suspicious software. (&lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/02/more-protection-from-unwanted-software.html&quot;&gt;Feb. 23&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Feedback and data-driven updates to Google’s Project Zero disclosure policy (&lt;a href=&quot;http://googleprojectzero.blogspot.jp/2015/02/feedback-and-data-driven-updates-to.html&quot;&gt;Feb. 13&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Universal SSL: Public beta version of new CloudFlare service encrypts data from the browser to the origin for free. (&lt;a href=&quot;https://blog.cloudflare.com/universal-ssl-encryption-all-the-way-to-the-origin-for-free/&quot;&gt;Feb. 24&lt;/a&gt;)&lt;/p&gt;
&lt;h4 dir=&quot;ltr&quot;&gt;
	Malware news + vulnerabilities&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;Google releases free, cloud-based web application security scanner that can help App Engine developers check for cross-site scripting and mixed content vulnerabilities. (&lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/02/using-google-cloud-platform-for.html&quot;&gt;Feb. 19&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Highlights from Internet Identity’s 2014 eCrime Trends Report (&lt;a href=&quot;http://internetidentity.com/blog/q4-2014-ecrime-trends-report-released/&quot;&gt;Feb. 25&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Fortinet: Decoy files used to spread CTB-Locker ransomware (&lt;a href=&quot;http://blog.fortinet.com/post/downloaders-and-decoys&quot;&gt;Feb. 16&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Automattic (&lt;a href=&quot;http://blog.vaultpress.com/2015/02/06/fancybox-for-wordpress-vulnerability/&quot;&gt;Feb. 6&lt;/a&gt;), Sucuri (&lt;a href=&quot;http://blog.sucuri.net/2015/02/analysis-of-the-fancybox-for-wordpress-vulnerability.html&quot;&gt;Feb. 16&lt;/a&gt;), and SiteLock (&lt;a href=&quot;http://blog.sitelock.com/2015/02/26/what-you-need-to-know-about-the-fancybox-for-wordpress-vulnerability/&quot;&gt;Feb. 26&lt;/a&gt;) on a serious vulnerability affecting most versions of the Fancybox-for-WordPress plugin&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;SiteLock on a security flaw in the UpdraftPlus premium WordPress plugin (&lt;a href=&quot;http://blog.sitelock.com/2015/02/17/sitelock-and-updraftplus-what-you-need-to-know/&quot;&gt;Feb. 17&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Sucuri: Vulnerabilities in Gravity Forms WP plugin (&lt;a href=&quot;http://blog.sucuri.net/2015/02/malware-cleanup-to-arbitrary-file-upload-in-gravity-forms.html&quot;&gt;Feb. 26&lt;/a&gt;) and analytics plugin WP-Slimstat (&lt;a href=&quot;http://blog.sucuri.net/2015/02/security-advisory-wp-slimstat-3-9-5-and-lower.html&quot;&gt;Feb. 24&lt;/a&gt;)&lt;/p&gt;
&lt;h4 dir=&quot;ltr&quot;&gt;
	Security news + perspectives&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;In case you missed it: After six years, StopBadware is shutting down its community forum. Details and recommended alternatives &lt;a href=&quot;https://www.stopbadware.org/blog/2015/02/24/stopbadware-shutting-down-community-forum-badwarebustersorg&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Automattic: WordPress 4.1.1 is out! This one’s a maintenance release. (&lt;a href=&quot;https://wordpress.org/news/2015/02/wordpress-4-1-1/&quot;&gt;Feb. 18&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;ESET on exploits: What are they, and how do they work? (&lt;a href=&quot;http://www.welivesecurity.com/2015/02/27/exploits-work/&quot;&gt;Feb. 27&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;DreamHost’s Mika E. talks about the virtues of open source and his experience writing plugins for WordPress. (&lt;a href=&quot;https://www.dreamhost.com/dreamscape/2015/02/10/writing-plugins-for-wordpress/&quot;&gt;Feb. 10&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;SiteLock: How you can tell if a website is secure (&lt;a href=&quot;http://blog.sitelock.com/2015/02/24/how-can-i-tell-if-a-website-is-secure-look-for-these-5-signs/&quot;&gt;Feb. 24&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Sucuri: Why websites get hacked (&lt;a href=&quot;http://blog.sucuri.net/2015/02/why-websites-get-hacked.html&quot;&gt;Feb. 26&lt;/a&gt;)&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/community-news&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;community news&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/stopbadware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/stopbadware-partners&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;StopBadware Partners&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/malware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;malware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/security-news&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;security news&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 03 Mar 2015 16:08:36 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">1951 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/03/03/community-news-and-analysis-february-2015#comments</comments>
</item>
<item>
 <title>StopBadware shutting down community forum BadwareBusters.org</title>
 <link>https://www.stopbadware.org/blog/2015/02/24/stopbadware-shutting-down-community-forum-badwarebustersorg</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;p&gt;It&#039;s been nearly six years &lt;a href=&quot;http://cyber.law.harvard.edu/newsroom/BadwareBusters&quot;&gt;to the day&lt;/a&gt; since StopBadware and its partners launched &lt;a href=&quot;https://www.badwarebusters.org&quot;&gt;BadwareBusters.org&lt;/a&gt;, our community platform for those who wanted to learn about and prevent badware. Over the years, the forum has helped thousands of website owners clean up hacked websites. Dozens of security experts have volunteered their time and talent to examine compromised sites, offer advice, and guide users to the best security resources for their needs. BadwareBusters has been exactly what it was intended to be when it launched in 2009: a place for our community to define its own needs, share stories, and learn from each other&#039;s experiences. &lt;/p&gt;
&lt;p&gt;At the end of this month, StopBadware will be &lt;a href=&quot;https://www.badwarebusters.org/main/itemview/35391?t=9800#itemblock-35391&quot;&gt;shutting down&lt;/a&gt; the forum. We&#039;re terribly proud of all that our community has accomplished these past six years; we don&#039;t take lightly the decision to close up shop, but limited resources mean StopBadware is no longer able to maintain the forum in a way that&#039;s fair and productive for users. &lt;/p&gt;
&lt;p&gt;We&#039;re confident those seeking help with hacked sites and malware cleanup can find what they&#039;re searching for in places such as Google&#039;s &lt;a href=&quot;http://productforums.google.com/forum/#!categories/webmasters/malware--hacked-sites&quot;&gt;malware forum&lt;/a&gt;, Bleeping Computer&#039;s &lt;a href=&quot;http://www.bleepingcomputer.com/forums/&quot;&gt;forums&lt;/a&gt;, or Stack Exchange&#039;s &lt;a href=&quot;http://security.stackexchange.com/questions/tagged/malware&quot;&gt;community Q&amp;amp;As&lt;/a&gt;. StopBadware&#039;s hacked sites &lt;a href=&quot;/hacked-sites-resources&quot;&gt;resources section&lt;/a&gt; also has useful tools and tutorials on finding and removing website malware, and longtime BadwareBusters moderator RedLeg maintains a gem of &lt;a href=&quot;http://aw-snap.info/&quot;&gt;a site&lt;/a&gt; on website cleanup. &lt;/p&gt;
&lt;p&gt;Thanks for your participation and your wisdom. Keep learning.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/badwarebusters&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;badwarebusters&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/stopbadware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/malware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;malware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/hacked-sites&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;hacked sites&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Tue, 24 Feb 2015 18:43:39 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">1941 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/02/24/stopbadware-shutting-down-community-forum-badwarebustersorg#comments</comments>
</item>
<item>
 <title>Community news and analysis: January 2015</title>
 <link>https://www.stopbadware.org/blog/2015/02/06/community-news-and-analysis-january-2015</link>
 <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;&lt;h4 dir=&quot;ltr&quot;&gt;
	General security news&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;Google looks back on how its security rewards programs did in 2014 and details a new vulnerability research grant it will offer in 2015. (Google Online Security Blog &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2015/01/security-reward-programs-year-in-review.html&quot;&gt;Jan 31&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Mozilla on referers [sic]: “This HTTP header has become quite problematic and not very useful...What’s needed is a better way for referring sites to reduce the amount of data transmitted and thus providing a more uniform referrer that’s less privacy invasive.” Firefox 36 Beta supports a “meta referrer” feature that gives sites tighter control over their referrers. (Mozilla Security &lt;a href=&quot;https://blog.mozilla.org/security/2015/01/21/meta-referrer/&quot;&gt;Jan. 21&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Mozilla is also progressing in its project to phase out certificates with 1024-bit RSA keys. See the post for a list of affected root certificates. (Mozilla Security &lt;a href=&quot;https://blog.mozilla.org/security/2015/01/28/phase-2-phasing-out-certificates-with-1024-bit-rsa-keys/&quot;&gt;Jan. 28&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;A WordPress security Q&amp;amp;A with VaultPress Vaultkeeper and lead developer Mark George (Automattic &lt;a href=&quot;http://blog.vaultpress.com/2015/01/30/wordpress-security-q-a-with-vaultpress-vaultkeeper/&quot;&gt;Jan. 30&lt;/a&gt;)&lt;/p&gt;
&lt;h4 dir=&quot;ltr&quot;&gt;
	Vulnerabilities&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;a href=&quot;https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability&quot;&gt;Qualys&lt;/a&gt;, &lt;a href=&quot;http://blog.sitelock.com/2015/02/05/sitelock-and-ghost-what-you-need-to-know/&quot;&gt;SiteLock&lt;/a&gt;, and &lt;a href=&quot;https://nakedsecurity.sophos.com/2015/01/29/the-ghost-vulnerability-what-you-need-to-know/&quot;&gt;Sophos&lt;/a&gt; on what you need to know about the much-mentioned GHOST vulnerability in the Linux glibc library. Patches were available as of Jan. 27, 2015.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Qualys (&lt;a href=&quot;https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/21/new-0-day-vulnerability-in-adobe-flash&quot;&gt;Jan. 21&lt;/a&gt; and &lt;a href=&quot;https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/02/02/february-0-day-for-adobe-flash&quot;&gt;Feb. 2&lt;/a&gt;) and Sophos (&lt;a href=&quot;https://nakedsecurity.sophos.com/2015/01/23/adobe-issues-emergency-fix-for-flash-zero-day/&quot;&gt;Jan. 23&lt;/a&gt; and &lt;a href=&quot;https://nakedsecurity.sophos.com/2015/01/24/adobe-gets-second-flash-zero-day-patch-ready-2-days-early/&quot;&gt;Jan. 24&lt;/a&gt;) have also offered excellent coverage of multiple recent Adobe zero-day vulnerabilities.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Webmaster warnings from Sucuri: Security vulnerabilities in Pagelines and Platform themes for WordPress (&lt;a href=&quot;http://blog.sucuri.net/2015/01/security-advisory-vulnerabilities-in-pagelinesplatform-theme-for-wordpress.html&quot;&gt;Jan. 21&lt;/a&gt;), remote code execution vulnerability in vBSEO (&lt;a href=&quot;http://blog.sucuri.net/2015/01/vbseos-vulnerability-leads-to-remote-code-execution.html&quot;&gt;Jan. 13&lt;/a&gt;), and a fake “mobile-shortcuts” WordPress plugin that injects SEO spam into websites. (&lt;a href=&quot;http://blog.sucuri.net/2015/01/bogus-mobile-shortcuts-plugin-injects-seo-spam.html&quot;&gt;Jan. 30&lt;/a&gt;)&lt;/p&gt;
&lt;h4 dir=&quot;ltr&quot;&gt;
	Malware&lt;/h4&gt;
&lt;p dir=&quot;ltr&quot;&gt;CTB-Locker: New campaigns spread malware that demands Bitcoin ransoms from victims; Poland, the Czech Republic, and Mexico have the highest infection rates. (ESET &lt;a href=&quot;http://www.welivesecurity.com/2015/01/21/ctb-locker-multilingual-malware-demands-ransome/&quot;&gt;Jan. 21&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Apparently, it’s such an ordeal for Belarusians wanting Polish visas to get an appointment at the Consulate of Poland that someone created a botnet with the express purpose of filling out forms to secure an appointment slot. Yes, really. (ESET &lt;a href=&quot;http://www.welivesecurity.com/2015/01/29/msilagent-pyo-have-botnet-will-travel/&quot;&gt;Jan. 29&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;5 ways to protect your website from malware (SiteLock &lt;a href=&quot;http://blog.sitelock.com/2015/01/20/5-ways-to-protect-your-website-from-malware/&quot;&gt;Jan. 20&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Fortinet malware analysis: Cracked version of an old Andromeda botnet malware variant spreads Bitcoin miner (&lt;a href=&quot;http://blog.fortinet.com/post/cracked-andromeda-2-06-spreads-bitcoin-miner&quot;&gt;Jan. 7&lt;/a&gt;), analysis of recent VBA macros (&lt;a href=&quot;http://blog.fortinet.com/post/old-but-new-an-analysis-of-recent-vba-macros&quot;&gt;Jan. 6&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;After a multinational takedown operation in December 2013, the ZeroAccess click fraud botnet has reappeared. At the end of January 2015, around 50K computers were compromised by the resurgent botnet, although researchers noted it doesn’t appear to be growing. (Sophos &lt;a href=&quot;https://nakedsecurity.sophos.com/2015/01/31/zeroaccess-click-fraud-botnet-coughs-back-to-life/&quot;&gt;Jan. 31&lt;/a&gt;)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;A mid-January malvertising campaign abused AdSense to redirect users to fake health websites. (Sucuri &lt;a href=&quot;http://blog.sucuri.net/2015/01/adsense-abused-with-malvertising-campaign.html&quot;&gt;Jan. 14&lt;/a&gt;)&lt;/p&gt;
&lt;div&gt;
	 &lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-post-tags field-type-taxonomy-term-reference field-label-above&quot;&gt;
      &lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;
    &lt;div class=&quot;field-items&quot;&gt;
          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/community-news&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;community news&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/partners&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;partners&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/stopbadware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;stopbadware&lt;/a&gt;&lt;/span&gt;,          &lt;span class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/malware&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;malware&lt;/a&gt;&lt;/span&gt;      &lt;/div&gt;
&lt;/div&gt;
</description>
 <pubDate>Fri, 06 Feb 2015 18:44:10 +0000</pubDate>
 <dc:creator>ccondon</dc:creator>
 <guid isPermaLink="false">1931 at https://www.stopbadware.org</guid>
 <comments>https://www.stopbadware.org/blog/2015/02/06/community-news-and-analysis-january-2015#comments</comments>
</item>
</channel>
</rss>
