<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    >

<channel>
    <title>Webmonkey &#187; Security</title>
    <atom:link href="http://www.webmonkey.com/category/security/feed/" rel="self" type="application/rss+xml" />
    <link>http://www.webmonkey.com</link>
    <description>The Web Developer&#039;s Resource</description>
    <lastBuildDate>Fri, 05 Apr 2013 20:20:46 +0000</lastBuildDate>
    <language>en-US</language>
    <sy:updatePeriod>hourly</sy:updatePeriod>
    <sy:updateFrequency>1</sy:updateFrequency>
    <generator>http://wordpress.org/?v=3.4.2</generator>
    
    <item>
        <title>Google: Here&#8217;s What to Do if Your Website Is Hacked</title>
        <link>http://www.webmonkey.com/2013/03/google-heres-what-to-do-if-your-site-is-hacked/</link>
        <comments>http://www.webmonkey.com/2013/03/google-heres-what-to-do-if-your-site-is-hacked/#comments</comments>
        <pubDate>Wed, 13 Mar 2013 13:39:21 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=61254</guid>
        		<category><![CDATA[Security]]></category>
		<category><![CDATA[Web Basics]]></category>
		<category><![CDATA[Google]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2013/03/malwaresite-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2013/03/malwaresite.jpg" alt="Google: Here&#8217;s What to Do if Your Website Is Hacked" /></div>Been hacked? Google has set up a new series of posts on how to get your site back under your control and off of Google's dreaded malware site list.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><div id="attachment_61257" class="wp-caption aligncenter" style="width: 590px"><a href="http://www.webmonkey.com/wp-content/uploads/2013/03/malwaresite.jpg"><img src="http://www.webmonkey.com/wp-content/uploads/2013/03/malwaresite.jpg" alt="" title="malwaresite" width="580" height="343" class="size-full wp-image-61257" /></a><p class="wp-caption-text">Chrome&#8217;s malware warning page. <em>Image: Google</em>.</p></div>Nothing drives away your visitors quite like a message from Google that &#8220;this site may harm your computer&#8221; or &#8220;this site may have been compromised.&#8221; </p>
<p>Hopefully you&#8217;ll never need it, but if your site does get hacked Google has set up a new site dedicated to <a href="http://googlewebmastercentral.blogspot.com/2013/03/new-first-stop-for-hacked-site-recovery.html">helping websites that have been hacked</a>.</p>
<p>The &#8220;<a href="http://www.google.com/webmasters/hacked/">Help for Hacked Sites</a>&#8221; section of Google&#8217;s Webmaster Tools offers up articles and videos to help you not only recover from compromising hacks, but take steps to make sure it doesn&#8217;t happen again.</p>
<p>Part of what makes hacked sites difficult to deal with is that oftentimes developers don&#8217;t even notice that they&#8217;ve been compromised. &#8220;Hacks are often invisible to users,&#8221; says Google in its new help section. &#8220;For example, unbeknownst to the site owner, the hacker may have infected their site with harmful code which in turn can record keystrokes on visitors&#8217; computers, stealing login credentials for online banking or financial transactions&#8221;</p>
<p>Google has an 8-step program for unhacking your site, which include basics like <a href="https://support.google.com/webmasters/bin/answer.py?hl=en&amp;answer=3013681">identifying the vulnerability</a> that was used to compromise your site, as well as how to <a href="https://support.google.com/webmasters/bin/answer.py?hl=en&amp;answer=2600725">request a review</a> so Google will remove the dreaded &#8220;this site has been compromised&#8221; message from its search results.</p>
<p>For more info and all the details on what to do if you&#8217;ve been hacked, check out the new <a href="http://www.google.com/webmasters/hacked/">Help for Hacked Sites</a> section of Google&#8217;s Webmaster Tools.</p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2013/03/google-heres-what-to-do-if-your-site-is-hacked/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Users Scramble as GitHub Search Exposes Passwords, Security Details</title>
        <link>http://www.webmonkey.com/2013/01/users-scramble-as-github-search-exposes-passwords-security-details/</link>
        <comments>http://www.webmonkey.com/2013/01/users-scramble-as-github-search-exposes-passwords-security-details/#comments</comments>
        <pubDate>Fri, 25 Jan 2013 16:14:42 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=60685</guid>
        		<category><![CDATA[Security]]></category>
		<category><![CDATA[Web Services]]></category>
		<category><![CDATA[Github]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2013/01/inspectocat-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2013/01/inspectocat.jpg" alt="Users Scramble as GitHub Search Exposes Passwords, Security Details" /></div>GitHub has temporarily crippled its new search tools in an effort to protect users caught storing private keys and passwords in public repositories. Unfortunately for those exposed Google long ago indexed your data, which means it's already on the web for anyone to find. Here's how to fix your GitHub mistakes and minimize the damage.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled --><div id="attachment_60686" class="wp-caption aligncenter" style="width: 590px"><a href="http://www.webmonkey.com/wp-content/uploads/2013/01/inspectocat.jpg"><img src="http://www.webmonkey.com/wp-content/uploads/2013/01/inspectocat.jpg" alt="" title="inspectocat" width="580" height="300" class="size-full wp-image-60686" /></a><p class="wp-caption-text">Inspectocat says &#8220;never store private stuff in public places.&#8221; <em>Image: <a href="http://octodex.github.com/inspectocat/">Github</a></em></p></div></p>
<p>GitHub has temporarily shut down some parts of the <a href="http://www.webmonkey.com/2013/01/find-the-droids-youre-looking-for-with-githubs-powerful-new-search-tools/">site-wide search update</a> it launched yesterday. As we mentioned in our earlier post, the new search tools made it much easier to find passwords, private ssh keys and security tokens stored in GitHub repos. </p>
<p>GitHub hasn&#8217;t officially addressed the issue, but it appears to be blocking some of the security-related searches that were posted earlier in this <a href="https://news.ycombinator.com/item?id=5104243">Hacker News thread</a>. </p>
<p>GitHub&#8217;s status site also <a href="https://status.github.com/messages">says</a> that &#8220;search remains unavailable,&#8221; though in my testing searching worked just fine so long as you weren&#8217;t entering words like &#8220;RSA,&#8221; &#8220;password,&#8221; &#8220;secret_token&#8221; or the like.</p>
<p>Most of the passwords and other security data exposed were personal &#8212; typically private ssh keys to someone&#8217;s server or a Gmail password &#8212; which is bad enough, but at least one appeared to reveal a password for an account on Chromium.org, the repository that holds the source code for Google&#8217;s open-source web browser. Another reportedly exposed an ssh password to a production server of a &#8220;<a href="https://twitter.com/0xabad1dea/status/294552123776049152">major, MAJOR website in China</a>.&#8221;</p>
<p>Unfortunately for people that have been storing their private security credentials in public GitHub repos what GitHub&#8217;s search engine revealed is nothing new. Google long ago indexed that data and a targeted <code>site:github.com</code> search will turn up the same exposed security info, which makes GitHub&#8217;s temporarily crippled search a token gesture at best.</p>
<p>If you accidentally stored sensitive data on GitHub the most important thing to do is <strong>change your passwords, keys and tokens</strong>. After you&#8217;ve created new security credentials for any exposed servers and accounts then you can go back and delete your old data from GitHub.</p>
<p>Given that Git, the version control system behind GitHub, is specifically designed to prevent data from disappearing, deleting your sensitive data takes more than just the Git command <code>rm</code>. GitHub has full details on how to <a href="https://help.github.com/articles/remove-sensitive-data">get your sensitive data off the site</a>. As GitHub&#8217;s instructions say, &#8220;if you committed a password, change it! If you committed a key, generate a new one. Once the commit has been pushed you should consider the data to be compromised.&#8221;</p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2013/01/users-scramble-as-github-search-exposes-passwords-security-details/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>HTTPS Everywhere 3.0 Secures the Web for Firefox, Chrome Users</title>
        <link>http://www.webmonkey.com/2012/10/https-everywhere-3-0-secures-the-web-for-firefox-chrome-users/</link>
        <comments>http://www.webmonkey.com/2012/10/https-everywhere-3-0-secures-the-web-for-firefox-chrome-users/#comments</comments>
        <pubDate>Wed, 10 Oct 2012 15:49:02 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=59462</guid>
        		<category><![CDATA[Browsers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[HTTPS]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/10/padlocks-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/10/padlocks.jpg" alt="HTTPS Everywhere 3.0 Secures the Web for Firefox, Chrome Users" /></div>The Electronic Frontier Foundation's quest to secure the web continues with an update to the organization's HTTPS Everywhere plugin for Firefox and Chrome. The latest version helps keep your data safe from prying eyes on thousands of websites by automatically redirecting you to a secure HTTPS connection.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><div id="attachment_59463" class="wp-caption alignleft" style="width: 360px"><a href="http://www.webmonkey.com/wp-content/uploads/2012/10/padlocks.jpg"><img src="http://www.webmonkey.com/wp-content/uploads/2012/10/padlocks.jpg" alt="" title="padlocks" width="350" height="199" class="size-full wp-image-59463" /></a><p class="wp-caption-text"><em>Image: <a href="http://www.flickr.com/photos/75982291@N07/7622876406/">HolySkittles/Flickr</a></em>.</p></div>The Electronic Frontier Foundation (EFF) has released version 3.0 of its HTTPS Everywhere browser plugin, which will automatically redirect you to secure, HTTPS connections. HTTPS Everywhere 3.0 adds support for 1,500 more websites, twice as many as previous releases. </p>
<p>Firefox users can install HTTPS Everywhere <a href="https://www.eff.org/https-everywhere">directly from the EFF site</a>. There&#8217;s also an alpha release available for Google&#8217;s Chrome web browser. Unfortunately, limited add-on APIs mean that HTTPS Everywhere isn&#8217;t available for other web browsers.</p>
<p>Once it&#8217;s installed, the HTTPS Everywhere extension makes it easy to ensure you’re connecting to secure sites by rewriting all requests to an HTTPS URL whenever you visit one of the thousands of sites HTTPS Everywhere supports.</p>
<p>Why all the fuss about HTTPS? Well, every time you log in to a website through a plain HTTP connection, you expose your data to the world. It’s a bit like writing your username and password on a postcard and dropping it in the mailbox. Think of an HTTPS connection as an envelope to protect your postcard from prying eyes.</p>
<p>The problem gets a bit more complicated than just HTTPS though. Most sites already use HTTPS to handle your login info &#8212; that&#8217;s a good first step &#8212; but once you&#8217;re logged in sites often revert back to using an insecure HTTP connection. </p>
<p>So <a href="http://www.webmonkey.com/2011/03/https-is-more-secure-why-isnt-the-web-using-it-today/">why doesn&#8217;t the entire web use HTTPS all the time</a>? The answer is slightly complicated, but the primary reason is speed. HTTPS can&#8217;t be cached on CDN networks, which means pages may load slightly slower than they would over standard, insecure connections. For smaller sites the added costs involved with HTTPS certificates make HTTPS more expensive. However neither of those stumbling blocks have stopped Google, Facebook, Twitter, Wikipedia or the thousands of other sites large and small that now offer HTTPS connections.</p>
<p>The EFF is still a long way from its long term goal of <a href="https://www.eff.org/encrypt-the-web">encrypting the entire web</a>, but with more sites supporting HTTPS connections every day the web is slowly but surely getting more secure.</p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/10/https-everywhere-3-0-secures-the-web-for-firefox-chrome-users/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Developer Quits OAuth 2.0 Spec, Calls It &#8216;a Bad Protocol&#8217;</title>
        <link>http://www.webmonkey.com/2012/07/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/</link>
        <comments>http://www.webmonkey.com/2012/07/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/#comments</comments>
        <pubDate>Tue, 31 Jul 2012 15:58:43 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=58115</guid>
        		<category><![CDATA[Security]]></category>
		<category><![CDATA[Web Services]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/07/oauth-shine-200-w.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/07/oauth-shine-200-w.jpg" alt="Developer Quits OAuth 2.0 Spec, Calls It &#8216;a Bad Protocol&#8217;" /></div>OAuth makes life easier for users by eliminating the need to hand over your username and password to third-party apps, but OAuth 2.0 has become so complex for developers that even its lead author no longer wants anything to do with it.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><img src="http://www.webmonkey.com/wp-content/uploads/2010/05/oauth-shine-200.jpg" alt="" title="oauth-shine-200" width="200" height="199" />After three years as lead author and editor of the OAuth 2.0 specification, Eran Hammer has stepped down from his role, withdrawn his name from the spec and even quit the OAuth working group completely, frustrated with what he now calls &#8220;a bad protocol.&#8221;</p>
<p>OAuth 2.0 is a rewrite of the original OAuth spec, which offers a secure way to sidestep the dilemma of having to hand over passwords to third party sites and apps to access user data. <a href="http://www.webmonkey.com/2010/03/gmail-now-more-secure-with-oauth-support/">Google</a>, Facebook, <a href="http://www.webmonkey.com/2010/08/twitter-moves-to-oauth-the-oauthcalypse-is-nigh/">Twitter</a>, and Yahoo are among the high-profile sites that have embraced OAuth in some fashion.</p>
<p>Unfortunately, <a href="http://hueniverse.com/2012/07/oauth-2-0-and-the-road-to-hell/">according to Hammer</a> those same big names are at least partly responsible for making OAuth 2.0 the fiendishly complex and convoluted spec that it has become. Hammer is not the first to question the usefulness of OAuth 2.0. In fact, we&#8217;ve previously argued that OAuth 2.0&#8242;s complexity is hurting the spirit of API experimentation on the web.</p>
<p>Hammer isn&#8217;t just questioning OAuth 2.0, he&#8217;s abandoned it entirely and completely erased himself from the project, calling it &#8220;a bad protocol&#8230; bad enough that I no longer want to be associated with it.&#8221;</p>
<p>In Hammer&#8217;s view OAuth 2.0 is &#8220;more complex, less interoperable, less useful, more incomplete, and most importantly, less secure&#8221; than its 1.0 cousin.</p>
<p>The problem according to Hammer are the &#8220;enterprise&#8221; edge cases which do nothing for the vast majority of developers other than make OAuth 2.0 more complex. As Hammer writes, &#8220;that is the enterprise way. The <a href="http://en.wikipedia.org/wiki/WS-*">WS-*</a> way. 2.0 provides a whole new frontier to sell consulting services and integration solutions.&#8221;</p>
<p>So what should you do? Well, as RSS developer Dave Winer says, &#8220;<a href="http://scripting.com/stories/2012/07/26/oauth1IsFine.html">OAuth 1 is fine</a>.&#8221; Indeed, OAuth 1.0 works and it&#8217;s much more accessible for smaller development teams &#8212; you don&#8217;t need Google&#8217;s engineering team to turn out a secure implementation of OAuth 1.0. Hammer has similar advice, writing, &#8220;if you are currently using 1.0 successfully, ignore 2.0. It offers no real value over 1.0.&#8221;</p>
<p>Of course the departure of an editor doesn&#8217;t mean OAuth 2.0 is going away. It remains, like many other standards, <a href="http://tools.ietf.org/html/draft-ietf-oauth-v2">under the auspices of the Internet Engineering Task Force</a> (IETF), which also oversees protocols like SMTP and TCP/IP.</p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/07/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Google to Strip Chrome of SSL Revocation Checking</title>
        <link>http://www.webmonkey.com/2012/02/google-to-strip-chrome-of-ssl-revocation-checking/</link>
        <comments>http://www.webmonkey.com/2012/02/google-to-strip-chrome-of-ssl-revocation-checking/#comments</comments>
        <pubDate>Tue, 07 Feb 2012 14:57:59 +0000</pubDate>

                <dc:creator>Dan Goodin - Ars Technica</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=54194</guid>
        		<category><![CDATA[Browsers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[chrome]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/02/chrome-bg-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/02/chrome-bg.jpg" alt="Google to Strip Chrome of SSL Revocation Checking" /></div>Google's Chrome web browser will stop relying on a decades-old method for ensuring SSL certificates are valid. As one Google engineer explains, "it’s worthless because it only works when you don’t need it."]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/business/guides/2012/02/google-strips-chrome-of-ssl-revocation-checking.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>Google&#8217;s Chrome browser will stop relying on a decades-old method for ensuring secure sockets layer certificates are valid after one of the company&#8217;s top engineers compared it to seat belts that break when they are needed most.</p>
<p>The browser will stop querying CRL, or certificate revocation lists, and databases that rely on OCSP, or online certificate status protocol, Google researcher Adam Langley said in a <a href="http://www.imperialviolet.org/2012/02/05/crlsets.html">blog post published on Sunday</a>. He said the services, which browsers are supposed to query before trusting a credential for an SSL-protected address, don&#8217;t make end users safer because Chrome and most other browsers establish the connection even when the services aren&#8217;t able to ensure a certificate hasn&#8217;t been tampered with.</p>
<p>&#8220;So soft-fail revocation checks are like a seat-belt that snaps when you crash,&#8221; Langley wrote. &#8220;Even though it works 99% of the time, it&#8217;s worthless because it only works when you don&#8217;t need it.&#8221;</p>
<p>SSL critics have long complained that the revocation checks are mostly useless. Attackers who have the ability to spoof the websites and certificates of Gmail and other trusted websites typically have the ability to replace warnings that the credential is no longer valid with a response that says the server is temporarily down. Indeed, Moxie Marlinspike&#8217;s SSL Strip hacking tool automatically supplies such messages, effectively bypassing the measure.</p>
<p>&#8220;While the benefits of online revocation checking are hard to find, the costs are clear: Online revocation checks are slow and compromise privacy,&#8221; Langley added. That&#8217;s because the checks add a median time of 300 milliseconds and a mean of almost 1 second to page loads, making many websites reluctant to use SSL. Marlinspike and others have also complained that the services allow certificate authorities to compile logs of user IP addresses and the sites they visit over time.</p>
<p>Chrome will instead rely on its automatic update mechanism to maintain a list of certificates that have been revoked for security reasons. Langley called on certificate authorities to provide a list of revoked certificates that Google bots can automatically fetch. The time frame for the Chrome changes to go into effect are &#8220;on the order of months,&#8221; a Google spokesman said.</p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/02/google-to-strip-chrome-of-ssl-revocation-checking/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Google, Microsoft, Yahoo, PayPal Go After Phishers With New E-Mail Authentication Effort</title>
        <link>http://www.webmonkey.com/2012/01/google-microsoft-yahoo-paypal-go-after-phishers-with-new-email-authentication-effort/</link>
        <comments>http://www.webmonkey.com/2012/01/google-microsoft-yahoo-paypal-go-after-phishers-with-new-email-authentication-effort/#comments</comments>
        <pubDate>Tue, 31 Jan 2012 15:18:00 +0000</pubDate>

                <dc:creator>Peter Bright (Ars Technica)</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=54128</guid>
        		<category><![CDATA[Security]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[Web Basics]]></category>
		<category><![CDATA[e-mail]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/01/dmarcflow-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/01/dmarcflow.jpg" alt="Google, Microsoft, Yahoo, PayPal Go After Phishers With New E-Mail Authentication Effort" /></div>The biggest names in e-mail have teamed up to create a new system for authenticating e-mail senders, which would help prevent fraudulent  spam and phishing messages.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/open-source/news/2012/01/google-microsoft-yahoo-paypal-go-after-phishers-with-new-e-mail-authentication-effort.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>Major e-mail providers, including Google, Microsoft, and Yahoo are teaming up with PayPal, Facebook, LinkedIn, and more, to implement a new system for authenticating e-mail senders to try to prevent the sending of fraudulent spam and phishing messages.</p>
<p>The protocol that powers e-mail, SMTP, dates back to a more trusting era; a time when the only people who sent you e-mails were people you wanted to send you e-mails. SMTP servers are willing to accept pretty much any e-mail destined for a mailbox they know about (which is, admittedly, an improvement on how things used to be, when they&#8217;d accept e-mails even for mailboxes they <a href="http://en.wikipedia.org/wiki/Open_mail_relay">didn&#8217;t know about</a>), a fact which spammers and phishers exploit daily.</p>
<p>Making any fundamental changes to SMTP itself is nigh impossible; there are too many e-mail servers, and they all have to interoperate with each other, an insurmountable hurdle for any major change. So what we&#8217;re left with is all manner of additional systems that are designed to give SMTP servers a bit more information about the person sending the e-mail, so that they can judge whether or not they really want to accept the message.</p>
<p>The two main systems in use today are called SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). Both systems use DNS to publish extra information about the e-mail sender&#8217;s domain. SPF tells the receiving server which outgoing servers are allowed to send mail for a given domain; if the receiving server receives mail from a server not on the list, it should assume that the mail is fraudulent. DKIM embeds a cryptographic signature to e-mail messages and an indication of which DNS entry to examine. The receiving server can then look up the DNS entry and use the data it finds to verify the signature.</p>
<p>These systems are not perfect; though both are used widely, they haven&#8217;t been adopted universally. This means that some legitimate mail will arrive that doesn&#8217;t have SPF or DKIM DNS entries, and so mail servers can&#8217;t depend on its presence. Common legitimate operations can also break them; many mailing list programs add footers to messages, which will cause rejection by DKIM, and forwarding e-mails causes rejection by SPF. As a result, failing one or other test is not a good reason to reject a message.</p>
<p>These systems also make it hard to diagnose misconfigurations; receiving servers will typically just swallow or ignore mails sent by systems with bad SPF or DKIM configurations.</p>
<p>The large group of companies, which includes the biggest web mail servers and some of the most common corporate victims of phishing attempts, is proposing a new scheme, <a href="http://dmarc.org/">DMARC</a> (&#8220;Domain-based Message Authentication, Reporting &amp; Conformance&#8221;), in an attempt to tackle these problems. DMARC fills some of the gaps in SPF and DKIM, making them more trustworthy.</p>
<div id="attachment_54131" class="wp-caption aligncenter" style="width: 590px"><img src="http://www.webmonkey.com/wp-content/uploads/2012/01/dmarcflow.jpg" alt="" title="dmarcflow" width="580" height="317" class="size-full wp-image-54131" /><p class="wp-caption-text">DMARC&#039;s position within the mail receipt process (illustration by dmarc.org)</p></div>
<p>DMARC is based on work done by PayPal in conjunction with Yahoo, and later extended to Gmail. This initial work resulted in a substantial reduction in the number of PayPal phishing attempts seen by users of those mail providers, and DMARC is an attempt to extend that to more organizations. As with SPF and DKIM, DMARC depends on storing extra information about the sender in DNS. This information tells receiving mail servers how to handle messages that fail the SPF or DKIM tests, and how critical the two tests are. The sender can tell recipient servers to reject messages that fail SPF and DKIM outright, to quarantine them somehow (for example, putting them into a spam folder), or to accept the mail normally and send a report of the failure back to the sender.</p>
<p>In turn, this makes SPF and DKIM much safer for organizations to deploy. They can start with the &#8220;notification&#8221; mode, confident that no mail will be lost if they have made a mistake, and use the information learned to repair any errors. DMARC also allows recipients to know if a domain should be using SPF and DKIM in the first place.</p>
<p>Without a global rollout, DMARC can&#8217;t solve all phishing and spam problems. The companies that have signed up to support the project include major recipients of phishing attempts—the various free e-mail providers—and sites against which phishing attacks are regularly made. Mail sent between the organizations will be verified using the SPF/DKIM/DMARC trifecta. Anyone using the major mail providers and the major services should see a substantial reduction in fraudulent mail. Senders and recipients who want to receive similar protection can implement DMARC themselves by following the specification that the DMARC group is working on.</p>
<p>Given the constraints imposed by SMTP, we may never get an e-mail system that is entirely free of malicious and annoying junk. SMTP e-mail was never designed to be trustworthy, and systems like SPF and DKIM are constrained by the inadequacies of SMTP&#8217;s design. Nonetheless, mechanisms such as DMARC can still make a big difference, and with the support of these major companies, e-mail might get that little bit safer.</p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<p><a href="http://dmarc.org/overview.html"><em>Illustration by dmarc.org</em></a></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/01/google-microsoft-yahoo-paypal-go-after-phishers-with-new-email-authentication-effort/feed/</wfw:commentRss>
        <slash:comments>5</slash:comments>

        
    </item>
    
    <item>
        <title>Worm Steals 45,000 Facebook Login Credentials, Infects Victims&#8217; Friends</title>
        <link>http://www.webmonkey.com/2012/01/worm-steals-45000-facebook-login-credentials-infects-victims-friends/</link>
        <comments>http://www.webmonkey.com/2012/01/worm-steals-45000-facebook-login-credentials-infects-victims-friends/#comments</comments>
        <pubDate>Thu, 05 Jan 2012 18:08:18 +0000</pubDate>

                <dc:creator>Jon Brodkin - Ars Technica</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=53491</guid>
        		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social]]></category>
		<category><![CDATA[facebook]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/01/facebook-logo-w.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/01/facebook-logo-w.jpg" alt="Worm Steals 45,000 Facebook Login Credentials, Infects Victims&#8217; Friends" /></div>Ramnit, a worm first discovered in April 2010, has made the leap from Windows to Facebook, where it's using stolen login credentials to spread itself through the social networking site.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://arstechnica.com/business/news/2012/01/worm-steals-45000-facebook-login-credentials-infects-victims-friends.ars"><img src="http://www.webmonkey.com/wp-content/uploads/2010/07/ars-technica1.jpg" /></a>A worm previously used to commit financial fraud is now stealing Facebook login credentials, compromising at least 45,000 Facebook accounts with the goals of transmitting malicious links to victims&#8217; friends and gaining remote access to corporate networks.</p>
<p>The security company Seculert has been <a href="http://blog.seculert.com/2012/01/ramnit-goes-social.html">tracking the progress of Ramnit</a>, a worm first discovered in April 2010, and <a href="http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32/Ramnit">described by Microsoft</a> as &#8220;multi-component malware that infects Windows executable files, Microsoft Office files and HTML files&#8221; in order to steal &#8220;sensitive information such as saved FTP credentials and browser cookies.&#8221; Ramnit has previously been used to &#8220;bypass two-factor authentication and transaction signing systems, gain remote access to financial institutions, compromise online banking sessions and penetrate several corporate networks,&#8221; Seculert says.</p>
<p>Recently, Seculert set up a sinkhole and discovered that 800,000 machines were infected between September and December. Moreover, Seculert found that more than 45,000 Facebook login credentials, mostly in the UK and France, were stolen by a new variant of the worm.</p>
<p>&#8220;We suspect that the attackers behind Ramnit are using the stolen credentials to log-in to victims&#8217; Facebook accounts and to transmit malicious links to their friends, thereby magnifying the malware&#8217;s spread even further,&#8221; Seculert said. &#8220;In addition, cybercriminals are taking advantage of the fact that users tend to use the same password in various web-based services (Facebook, Gmail, Corporate SSL VPN, Outlook Web Access, etc.) to gain remote access to corporate networks.&#8221;</p>
<p>Facebook fraud, of course, is nothing new. <a href="http://arstechnica.com/gadgets/news/2011/10/facebook-sees-600000-compromised-logins-per-day006-of-all-logins.ars">Facebook itself has acknowledged seeing 600,000 compromised logins each day</a>, although that accounts for just 0.06 percent of the one billion Facebook logins each day.</p>
<p><em>This article originally appeared on <a href="http://www.arstechnica.com/">Ars Technica</a>, Wired&#8217;s sister site for in-depth technology news.</em></p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/01/worm-steals-45000-facebook-login-credentials-infects-victims-friends/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Why Wait for Google? Use Encrypted Search Today</title>
        <link>http://www.webmonkey.com/2011/09/dont-wait-for-google-use-googles-encrypted-search-today/</link>
        <comments>http://www.webmonkey.com/2011/09/dont-wait-for-google-use-googles-encrypted-search-today/#comments</comments>
        <pubDate>Thu, 08 Sep 2011 15:28:45 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=51563</guid>
        		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[ssl]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2011/09/pad_locks.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2011/09/pad_locks.jpg" alt="Why Wait for Google? Use Encrypted Search Today" /></div>The beta version of Google Chrome is now selectively redirecting users to Google's encrypted search page for improved privacy and security. Here's how to make your favorite browser join the HTTPS revolution.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled --><img src="http://www.webmonkey.com/wp-content/uploads/2011/03/padlocks_by_joffley_flickr.jpg" alt="" />Google appears to be expanding the use of its encrypted search page, automatically redirecting some Chrome users to the HTTPS version of Google search. The company has also expanded the number of Google search tools that work with the encrypted page to include Google Image Search, Google Instant and Google Instant Preview.</p>
<p>Using Google search over SSL means that your search terms are encrypted, so prying eyes can&#8217;t see what you&#8217;re searching for, nor can they see the results you get back. Google&#8217;s efforts to provide an encrypted search page are just one part of a broader move afoot on the web to shift more traffic over to <a href="http://www.webmonkey.com/2011/03/https-is-more-secure-why-isnt-the-web-using-it-today/">the more secure HTTPS protocol</a>.</p>
<p>Why all the fuss about HTTPS? Well, every time you search Google or log in to Twitter or Facebook over a plain HTTP connection, you expose your data to the world. It’s a bit like writing your username and password on a postcard and dropping it in the mailbox. There is a better way, the secure version of HTTP — HTTPS. That extra “S” in the URL means your connection is secure, and it’s much harder for anyone else to see what you’re doing. Think of the extra “S” as the envelop that keeps prying eyes from looking at your postcards.</p>
<p>Although the HTTPS version of Google does, <a href="http://www.google.com/support/websearch/bin/static.py?hl=en&amp;page=guide.cs&amp;guide=1224171&amp;answer=173733&amp;rd=1">in Google&#8217;s words</a>, &#8220;provide you with a more secure and private search experience,&#8221; it&#8217;s worth noting that it doesn&#8217;t stop <em>Google</em> from tracking your search terms and other data.</p>
<p><a href="http://googlesystem.blogspot.com/2011/09/google-redirects-some-chrome-users-to.html">Google Operating System</a>, which tracks all things Google, dug up a post on the Google Support Forums where a Google employee <a href="http://www.google.com/support/forum/p/Web%20Search/thread?tid=04ab55e2eb905e35&amp;hl=en">says</a> that Google is &#8220;running an experiment with some percentage of Chrome 14 users where we send them to SSL search.&#8221; That means that some Chrome users may find themselves using the HTTPS search page without even realizing they are.</p>
<p>Chrome 14 is still in beta, so in order for this to affect you, you&#8217;ll need to be using the beta channel.</p>
<p>Of course even if you aren&#8217;t part of Google&#8217;s effort to expand Google Search over SSL, doesn&#8217;t mean you can&#8217;t configure your browser to use the HTTPS search page by default. Firefox fans can just install the <a href="http://www.webmonkey.com/2011/08/firefox-security-tool-https-everywhere-hits-1-0/">HTTPS Everywhere extension</a>. Chrome and Chromium users can simply right-click the URL bar, choose &#8220;edit search engines&#8221; and then look for the Google entry. Just click edit, add an &#8220;s&#8221; to the end of the &#8220;http&#8221; and you&#8217;re done. Internet Explorer users can head to the IE add-ons page and <a href="http://www.ieaddons.com/en/createsearch.aspx">create a new search provider</a> using the form.</p>
<p><em>Photo: <a href="http://www.flickr.com/photos/joffley/4972245286/">Joffley</a>/Flickr/CC</em></p>
<p><strong>See Also:</strong></p>
<ul>
<li><a href="http://www.webmonkey.com/2011/04/eff-wants-to-secure-the-web-with-https-now-campaign/">EFF Wants to Secure the Web With “HTTPS Now” Campaign</a></li>
<li><a href="http://www.webmonkey.com/2011/03/https-is-more-secure-why-isnt-the-web-using-it-today/">HTTPS Is More Secure, So Why Isn’t the Web Using It?</a></li>
<li><a href="http://www.webmonkey.com/2011/08/firefox-security-tool-https-everywhere-hits-1-0/">Firefox Security Tool HTTPS Everywhere Hits 1.0</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2011/09/dont-wait-for-google-use-googles-encrypted-search-today/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>Firefox Security Tool HTTPS Everywhere Hits 1.0</title>
        <link>http://www.webmonkey.com/2011/08/firefox-security-tool-https-everywhere-hits-1-0/</link>
        <comments>http://www.webmonkey.com/2011/08/firefox-security-tool-https-everywhere-hits-1-0/#comments</comments>
        <pubDate>Fri, 05 Aug 2011 15:42:42 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=51290</guid>
        		<category><![CDATA[Browsers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Web Basics]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[HTTPS Everwhere]]></category>
        <description><![CDATA[After a year of beta testing the Electronic Frontier Foundation&#8217;s HTTPS Everywhere Firefox add-on has reached stable, 1.0 status. The HTTPS Everywhere extension makes it easy to ensure you&#8217;re connecting to secure sites by rewriting all requests to an HTTPS URL whenever you visit one of the sites HTTPS Everywhere supports. If you&#8217;re using Firefox, [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><img src="http://www.webmonkey.com/wp-content/uploads/2011/03/padlocks_by_joffley_flickr.jpg" />After a year of beta testing the Electronic Frontier Foundation&#8217;s HTTPS Everywhere Firefox add-on has reached stable, 1.0 status. The HTTPS Everywhere extension makes it easy to ensure you&#8217;re connecting to secure sites by rewriting all requests to an HTTPS URL whenever you visit one of the sites HTTPS Everywhere supports.</p>
<p>If you&#8217;re using Firefox, head over to the EFF&#8217;s website and <a href="https://www.eff.org/https-everywhere">install HTTPS Everywhere</a>. If you&#8217;re not using Firefox you&#8217;re unfortunately out of luck. The limited add-on APIs of browsers like Chrome and Safari mean that HTTPS Everywhere can&#8217;t be ported to those platforms (see the <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere site</a> for more info).</p>
<p>Why all the fuss about HTTPS? Well, every time you log in to Twitter, Facebook or any other service that uses a plain HTTP connection, you expose your data to the world. It&#8217;s a bit like writing your username and password on a postcard and dropping it in the mailbox.</p>
<p>With HTTPS Everywhere installed, if you type, for example, &#8220;twitter.com&#8221; in the Firefox URL bar, the browser will automatically connect to https://twitter.com rather than http://twitter.com. Think of an HTTPS connection as an envelope to protect your postcard from prying eyes.</p>
<p>With the 1.0 release, HTTPS Everywhere now supports some 1000 websites, including the web&#8217;s most popular like Google Search, Facebook and Wikipedia. One thing to keep in mind though, not every website supported serves all of its content over HTTPS, which can still leave you open to some vulnerabilities (the Chrome web browser now warns when a site serves HTTP content alongside HTTPS, a feature other browsers will hopefully copy).</p>
<p>Still, even if not every website supports HTTPS completely, Firefox with HTTPS Everywhere is more secure than most browser setups. If you&#8217;re using Firefox anyway, it&#8217;s well worth installing HTTPS Everywhere, particularly if you frequently use wifi networks you don&#8217;t control.</p>
<p><em>Photo: <a href="http://www.flickr.com/photos/joffley/4972245286/">Joffley</a>/Flickr/CC</em></p>
<p><strong>See Also:</strong>     </p>
<ul>
<li><a href="http://www.webmonkey.com/2011/04/eff-wants-to-secure-the-web-with-https-now-campaign/">EFF Wants to Secure the Web With “HTTPS Now” Campaign</a></li>
<li><a href="http://www.webmonkey.com/2010/11/secure-firefox-with-new-https-everywhere-add-on/">Secure Firefox With New HTTPS Everywhere Add-on</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2011/08/firefox-security-tool-https-everywhere-hits-1-0/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>EFF Wants to Secure the Web With &#8220;HTTPS Now&#8221; Campaign</title>
        <link>http://www.webmonkey.com/2011/04/eff-wants-to-secure-the-web-with-https-now-campaign/</link>
        <comments>http://www.webmonkey.com/2011/04/eff-wants-to-secure-the-web-with-https-now-campaign/#comments</comments>
        <pubDate>Fri, 22 Apr 2011 15:48:24 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=50703</guid>
        		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Web Basics]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[HTTPS Everwhere]]></category>
        <description><![CDATA[The Electronic Frontier Foundation (EFF) has kicked off a new &#8220;HTTPS Now&#8221; campaign to educate consumers and help &#8220;make web surfing safer.&#8221; The new campaign is a two part effort. First the EFF would like to encourage users to install the HTTPS Everywhere Firefox add-on, which will automatically redirect you to https connections. HTTPS Everywhere [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><img src="http://www.webmonkey.com/wp-content/uploads/2011/03/padlocks_by_joffley_flickr.jpg" />The Electronic Frontier Foundation (EFF) has kicked off a new &#8220;<a href="http://www.eff.org/press/releases">HTTPS Now</a>&#8221; campaign to educate consumers and help &#8220;make web surfing safer.&#8221;</p>
<p>The new campaign is a two part effort. First the EFF would like to encourage users to install the <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> Firefox add-on, which will <a href="http://www.webmonkey.com/2010/11/secure-firefox-with-new-https-everywhere-add-on/">automatically redirect you to https connections</a>. HTTPS Everywhere makes sure you&#8217;re always using a secure connection when you visit Gmail, Twitter and several dozen other sites; you don&#8217;t need to worry about checking the URL everytime you login.</p>
<p>While HTTPS Everywhere is a good suggestion for users, the primary thrust of the HTTPS Now campaign is aimed at popular websites. After all, HTTPS Everywhere only works if your favorite sites offer secure connections, and an alarming number of sites do not. </p>
<p>The EFF has partnered with <a href="https://www.accessnow.org/">Access</a>, a digital freedom activist group, to create the new <a href="https://httpsnow.org/">HTTPS Now website</a>. The new site will keep track of which sites offer HTTPS connections, how much of the site is secure and whether or not the site mixes secure and insecure content.</p>
<p>Why all the fuss about HTTPS? Well, every time you log in to Twitter, Facebook or any other service that uses a plain HTTP connection, you expose your data to the world. It&#8217;s a bit like writing your username and password on a postcard and dropping it in the mailbox.</p>
<p>There is a better way, the secure version of HTTP &#8212; HTTPS. That extra &#8220;S&#8221; in the URL means your connection is secure, and it&#8217;s much harder for anyone else to see what you&#8217;re doing. Think of the extra &#8220;S&#8221; as the envelop that keeps prying eyes from looking at your postcards.</p>
<p>The problem gets a bit more complicated than just HTTPS though. Most sites already use HTTPS to handle your login info &#8212; that&#8217;s a good first step &#8212; but once you&#8217;re logged in the sites often revert back to using an insecure HTTP connection. That means you&#8217;re vulnerable to simple attacks like those made possible by the Firesheep Firefox plugin. Firesheep sniffs network traffic and looks for insecure cookies which it then uses to spoof your login credentials to the site. Firesheep allows other people to quickly and easily become you on the web.</p>
<p>So <a href="http://www.webmonkey.com/2011/03/https-is-more-secure-why-isnt-the-web-using-it-today/">why doesn&#8217;t the entire web use HTTPS all the time</a>? The answer is slightly complicated, but the primary reason is speed. HTTPS can&#8217;t be cached on CDN networks and there are also some (minor) costs involved with HTTPS certificates.</p>
<p>But obviously neither cost nor minor speed hits have stopped big sites like Twitter, Facebook, Gmail and Flickr from implementing HTTPS. The EFF would like to encourage other sites to follow suit.</p>
<p>If you&#8217;d like to see how your favorite sites fair when it comes to protecting your data from traffic snoops, head on over to the <a href="https://httpsnow.org/">HTTPS Now website</a>.</p>
<p><em>Photo: <a href="http://www.flickr.com/photos/joffley/4972245286/">Joffley</a>/Flickr/CC</em></p>
<p><strong>See Also:</strong><br/></p>
<ul>
<li><a href="http://www.webmonkey.com/2011/03/https-is-more-secure-why-isnt-the-web-using-it-today/">HTTPS Is More Secure, So Why Isn&#8217;t the Web Using It?</a></li>
<li><a href="http://www.webmonkey.com/2010/11/secure-firefox-with-new-https-everywhere-add-on/">Secure Firefox With New HTTPS Everywhere Add-on</a></li>
<li><a href="http://www.webmonkey.com/2010/01/eff_reveals_how_your_digital_fingerprint_makes_you_easy_to_track/">EFF Reveals How Your Digital Fingerprint Makes You Easy to Track</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2011/04/eff-wants-to-secure-the-web-with-https-now-campaign/feed/</wfw:commentRss>
        <slash:comments>14</slash:comments>

        
    </item>
    </channel>
</rss>