<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    >

<channel>
    <title>Webmonkey &#187; Security</title>
    <atom:link href="http://www.webmonkey.com/tag/security/feed/" rel="self" type="application/rss+xml" />
    <link>http://www.webmonkey.com</link>
    <description>The Web Developer&#039;s Resource</description>
    <lastBuildDate>Mon, 06 May 2013 17:29:19 +0000</lastBuildDate>
    <language>en-US</language>
    <sy:updatePeriod>hourly</sy:updatePeriod>
    <sy:updateFrequency>1</sy:updateFrequency>
    <generator>http://wordpress.org/?v=3.4.2</generator>
    
    <item>
        <title>Massive WordPress Attack Targets Weak Admin Passwords</title>
        <link>http://www.webmonkey.com/2013/04/massive-wordpress-attack-targets-weak-admin-passwords/</link>
        <comments>http://www.webmonkey.com/2013/04/massive-wordpress-attack-targets-weak-admin-passwords/#comments</comments>
        <pubDate>Tue, 16 Apr 2013 13:51:53 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=61615</guid>
        		<category><![CDATA[Blog Publishing]]></category>
		<category><![CDATA[Web Apps]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[WordPress]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2013/04/wptarget-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2013/04/wptarget.jpg" alt="Massive WordPress Attack Targets Weak Admin Passwords" /></div>Got strong passwords? A powerful new attack against the popular WordPress publishing system targets the weakest link in WordPress security -- you. With some 90,000 IP addresses at their disposal the unknown attackers are simply brute-forcing their way into WordPress' admin pages by trying thousands of weak passwords against the old default "admin" user account. ]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><div id="attachment_61618" class="wp-caption aligncenter" style="width: 590px"><a href="http://www.webmonkey.com/wp-content/uploads/2013/04/wptarget.jpg"><img src="http://www.webmonkey.com/wp-content/uploads/2013/04/wptarget.jpg" alt="" title="wptarget" width="580" height="413" class="size-full wp-image-61618" /></a><p class="wp-caption-text"><em>Image: <a href="http://blog.cloudflare.com/patching-the-internet-fixing-the-wordpress-br">CloudFlare</a></em></p></div>If you&#8217;re using the popular open source blogging tool WordPress to power your website, you may be vulnerable to a new web-based attack. </p>
<p>If your WordPress admin pages suddenly become sluggish, unreachable or you&#8217;re unable to log in there&#8217;s a good chance your site is being attacked. </p>
<p>According to CloudFlare CEO Matthew Prince, the attack is <a href="http://blog.cloudflare.com/patching-the-internet-fixing-the-wordpress-br">using brute force</a> against WordPress&#8217; admin pages using the old default username &#8220;admin&#8221; and then trying thousands of passwords. There&#8217;s nothing new about that approach, but what makes this attack different, and particularly potent, is that the attackers have some 90,000 unique IP addresses at their disposal. </p>
<p>For its part CloudFlare has pushed out an update that &#8220;detects the signature of the attack and stops it.&#8221;</p>
<p>Popular WordPress Host HostGator <a href="http://blog.hostgator.com/2013/04/11/global-wordpress-brute-force-flood/">reports</a> that it too has &#8220;seen over 90,000 IP addresses involved in this attack.&#8221; </p>
<p>WordPress creator Matt Mullenweg has also weighed in, pointing out that it&#8217;s been over three years since WordPress used the username &#8220;admin&#8221; as the default for new installations. </p>
<p>However, there are no doubt a great many sites that still have &#8212; whether they use it or not &#8212; the &#8220;admin&#8221; user account hanging around in WordPress. It&#8217;s also worth noting that, while this attack appears limited to trying the &#8220;admin&#8221; username, a more sophisticated approach could do the same thing, but with unique usernames &#8212; for example, find the most frequently used account name on the public site, assume it&#8217;s an admin account and run the same attack against the admin pages. So far that hasn&#8217;t happened.</p>
<p>&#8220;Here&#8217;s what I would recommend,&#8221; <a href="http://ma.tt/2013/04/passwords-and-brute-force/">writes Mullenweg on his blog</a>, &#8220;if you still use &#8220;admin&#8221; as a username on your blog, <a href="http://www.digitalkonline.com/blog/change-your-wordpress-admin-username/">change it</a>, use <a href="http://en.support.wordpress.com/selecting-a-strong-password/">a strong password</a>, if you&#8217;re on WP.com turn on <a href="http://en.blog.wordpress.com/2013/04/05/two-step-authentication/">two-factor authentication</a>, and of course make sure you&#8217;re up to date on the latest version of WordPress.&#8221; </p>
<p>Unfortunately, given the number of IP addresses that seem to be at the attackers&#8217; disposal, other common security measures &#8212; like tools that limit logins by IP address &#8212; aren&#8217;t going to be terribly effective against this attack. Short of getting rid of the default &#8220;admin&#8221; account (if it still exists), there isn&#8217;t a whole lot you can do to stop the attacks (unless you want to use a web application firewall like CloudFlare or <a href="http://blog.sucuri.net/2013/04/mass-wordpress-brute-force-attacks-myth-or-reality.html">ModSecurity</a>). Be sure to contact your hosting company if you think your site has come under attack.</p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2013/04/massive-wordpress-attack-targets-weak-admin-passwords/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>What to Do When Your Website Is Hacked</title>
        <link>http://www.webmonkey.com/2012/04/what-to-do-when-your-website-is-hacked/</link>
        <comments>http://www.webmonkey.com/2012/04/what-to-do-when-your-website-is-hacked/#comments</comments>
        <pubDate>Mon, 23 Apr 2012 15:27:44 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=55804</guid>
        		<category><![CDATA[servers]]></category>
		<category><![CDATA[Web Basics]]></category>
		<category><![CDATA[DIY]]></category>
		<category><![CDATA[Security]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2012/04/security_by_David_Bleasdale_flickr-200x100.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2012/04/security_by_David_Bleasdale_flickr.jpg" alt="What to Do When Your Website Is Hacked" /></div>The DIY web is also the FIY (fix-it-yourself) web, which means if your site gets hacked you need to know how to reclaim your little corner of the web. Developer Martin Sutherland offers a blueprint for what to do when your site is hacked.]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<div id="attachment_55813" class="wp-caption aligncenter" style="width: 610px"><a href="http://www.flickr.com/photos/sidelong/3878741556/"><img src="http://www.webmonkey.com/wp-content/uploads/2012/04/security_by_David_Bleasdale_flickr.jpg" alt="" title="security_by_David_Bleasdale_flickr" width="600"   /></a><p class="wp-caption-text">All it takes is one open lock. <em>Photo: <a href='http://www.flickr.com/photos/sidelong/3878741556/'>David Bleasdale/Flickr</a></em></p></div>
<p>One drawback to the otherwise awesome sauce of <a href="http://www.webmonkey.com/2011/02/take-back-the-tubes/">the do-it-yourself web</a> is that you&#8217;re also responsible for fixing it yourself when something goes wrong &#8212; call it the FIY corollary to the DIY web. </p>
<p>For example, what happens if the bad guys attack your website? </p>
<p>In some cases your web hosting service may be able to help, but most of the time undoing the damage is your responsibility. Websites are attacked every day; well-tested though they may be, frameworks and publishing tools inevitably have security flaws and eventually you may be bitten by one. Or it might not even be the tools that end up being the problem, it might be something far less obvious. Developer <a href="http://sunpig.com/martin/archives/2012/04/18/hacked-grr.html">Martin Sutherland&#8217;s server was recently hacked</a> because one file on a shared server had the wrong file permissions.</p>
<p>Sutherland&#8217;s write-up of how he discovered and fixed the attack on his server is well worth a read and makes an excellent primer on how to handle being hacked. While Sutherland&#8217;s situation may be specific to the attack that his site suffered, his diagnostic steps make an excellent starting point even if you use a completely different publishing system. (Sutherland uses Movable Type.)</p>
<p>Sutherland&#8217;s strategy (once he realizes he&#8217;s been hacked) is to scan through all the files on his server to see which ones had recently been changed. He then filters that list, ignoring files that should have changed (log files, etc.) and narrowing it down to suspicious file changes.</p>
<p>How much this approach will tell you if your own site has been hacked depends on what the attacker has done and what your server setup looks like, but it should help you get moving in the right direction. Read through the full post for the specific command line tools Sutherland uses to inspect his files. If you&#8217;re not comfortable on the command line or don&#8217;t have shell access to your server you may be able to use something like <a href="http://wordpress.org/extend/plugins/exploit-scanner/">Exploit Scanner</a> (if you&#8217;re using WordPress) or a similar tool for your publishing system. </p>
<p>Once you know what happened and which files were affected it&#8217;s just a matter of rolling back the changes using your backups. You do <a href="http://www.webmonkey.com/2011/03/its-march-31st-do-you-know-where-your-files-are/">have backups</a> right? As Sutherland writes, &#8220;it&#8217;s not a matter of <em>if</em> something goes wrong, it&#8217;s a matter of <em>when</em>.&#8221; Remember: backups are only useful if you have them <em>before</em> you need them.</p>
<p>We sincerely hope your site is never hacked, however, it does happen all too frequently. As Sutherland&#8217;s write-up illustrates, one of the keys to making sure that you recover quickly is to have good backups. Do yourself a favor and spend a few minutes creating an automated backup system before something goes wrong. Now excuse me while I go make sure my <code>pg_dump</code> cron script is running properly. </p>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2012/04/what-to-do-when-your-website-is-hacked/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>New Privacy Icons Aim to Save You From Yourself</title>
        <link>http://www.webmonkey.com/2010/12/new-privacy-icons-aim-to-save-you-from-yourself/</link>
        <comments>http://www.webmonkey.com/2010/12/new-privacy-icons-aim-to-save-you-from-yourself/#comments</comments>
        <pubDate>Thu, 23 Dec 2010 17:40:35 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=49404</guid>
        		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Web Standards]]></category>
		<category><![CDATA[mozilla]]></category>
		<category><![CDATA[Privacy Icons]]></category>
		<category><![CDATA[Security]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2010/12/privacyicons.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2010/12/privacyicons.jpg" alt="New Privacy Icons Aim to Save You From Yourself" /></div>Mozilla has taken the lead among browser vendors to make a site&#8217;s privacy settings more explicitly visible. It&#8217;s doing so by proposing visual cues in the browser that indicate what level of privacy you&#8217;re currently browsing at, and what pieces of your personal data the site you&#8217;re currently visiting is sharing with the rest of [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<div id="attachment_49406" class="wp-caption aligncenter" style="width: 590px"><a href="http://www.webmonkey.com/wp-content/uploads/2010/12/privacyicons.jpg"><img src="http://www.webmonkey.com/wp-content/uploads/2010/12/privacyicons.jpg" alt="" title="privacyicons" width="580" height="176" class="size-full wp-image-49406" /></a><p class="wp-caption-text">A few of the proposed privacy icons</p></div>
<p>Mozilla has taken the lead among browser vendors to make a site&#8217;s privacy settings more explicitly visible. It&#8217;s doing so by proposing visual cues in the browser that indicate what level of privacy you&#8217;re currently browsing at, and what pieces of your personal data the site you&#8217;re currently visiting is sharing with the rest of the web.</p>
<p>Earlier this year, Mozilla&#8217;s head user experience designer Aza Raskin <a href="http://www.webmonkey.com/2010/01/creating_a_better_privacy_policy/">proposed creating a set of icons to denote the privacy policy of a website</a>. Now, after getting feedback from a wide range of interested groups &#8212; from the Electronic Frontier Foundation to the Federal Trade Commission &#8212; Raskin has <a href="http://www.azarask.in/blog/post/privacy-icons/">drawn up a new and improved icon set</a>. </p>
<p>The idea behind Raskin&#8217;s proposal is that the browser is the most logical place to display identity and privacy information to the user as they click around on the social web. The end goal is to produce a set for warnings similar to the way that Firefox (and other browsers) currently handle phishing attack warnings, using visual icons and simple language to explain what you&#8217;re getting into when you load a page with a different level of privacy or security.</p>
<p>For the active social web user, keeping track of which bits of your data are public and which are private on different sites is a chore. Some websites share your photos, status updates, your list of friends, who you&#8217;re following and other data default. Some share nothing. The rest are somewhere in the middle.</p>
<p>Part of the problem is the privacy policies themselves. They are complex, mind-numbingly long legal documents. We routinely ignore them, breezing past them by clicking &#8220;I agree.&#8221; Once clicked, your rights are compromised, and you may not be able to fully restore them.</p>
<p>A set of icons in the browser, to quickly and easily allow users to know what will happen to their data, means that users don&#8217;t need a law degree to know what&#8217;s happening to their images, status updates and other data.</p>
<p>The big difference between privacy icons and the phishing warnings your browser already offers, is that these icons are targeted at the websites themselves. The biggest counter-argument to Raskin&#8217;s proposal is that there&#8217;s nothing stopping a site from displaying these icons and then doing the opposite.</p>
<p>Raskin&#8217;s solution is to make the privacy icons supersede the written privacy policy. &#8220;When you add a Privacy Icon to your privacy policy,&#8221; writes Raskin, &#8220;it says the equivalent of &#8216;No matter what the rest of this privacy policy says, the following is true and preempts anything else in this document&#8230;&#8217;&#8221;</p>
<p>In other words, sites using the icons maliciously would face legal consequences. Of course differences in international laws mean enforcing such violations would be complex.</p>
<p>Still, as Raskin points out, privacy policies are fast becoming a selling point for many sites. Nearly every site we&#8217;ve tested lately has some sort of large, obvious banner that proudly proclaims the site will never share your data. Those are the kinds of sites, says Raskin, that would adopt privacy icons.</p>
<p>But it&#8217;s still unlikely any site would ever adopt the negative icons. If you&#8217;re sharing everything users give you with anyone who pays for it, you probably don&#8217;t want to advertise that. So the privacy icons actually become most useful when they aren&#8217;t present. Of course, as Raskin writes, &#8220;people don&#8217;t generally don&#8217;t notice an absence; just a presence.&#8221; </p>
<p>The solution to that problem is to make the privacy icons machine readable. The workflow would be something like this: You visit a website and decide to sign up. When Firefox encounters the sign-up form, it looks for the privacy icon. If it finds it, Firefox displays it. If Firefox doesn&#8217;t see an icon it warns you that your information may be shared using the negative icon. Either way, you know where you stand.</p>
<p>For now the privacy icons, good idea though they may be, are a long way from reality. Raskin calls the current mockups an &#8220;alpha&#8221; release and since <a href="http://www.azarask.in/blog/post/leaving-mozilla/">Raskin is leaving Mozilla</a>, the future of the project is unclear. If you&#8217;d like to get involved, head over the <a href="http://www.drumbeat.org/project/privacy-icons">Mozilla Drumbeat Privacy Icons project page</a>.</p>
<p><strong>See Also:</strong><br/></p>
<ul>
<li><a href="http://www.webmonkey.com/2010/01/creating_a_better_privacy_policy/">Warning: This Site May Be Sharing Your Data</a></li>
<li><a href="http://www.webmonkey.com/2008/03/mark_zuckerberg_on_privacy_and_the_future_of_facebook_news_feeds/">Mark Zuckerberg on Privacy and the Future of Facebook News Feeds</a></li>
<li><a href="http://www.webmonkey.com/2007/09/google_wants_global_privacy_rules/">Google Wants Global Privacy Rules</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/12/new-privacy-icons-aim-to-save-you-from-yourself/feed/</wfw:commentRss>
        <slash:comments>14</slash:comments>

        
    </item>
    
    <item>
        <title>Secure Firefox With New HTTPS Everywhere Add-on</title>
        <link>http://www.webmonkey.com/2010/11/secure-firefox-with-new-https-everywhere-add-on/</link>
        <comments>http://www.webmonkey.com/2010/11/secure-firefox-with-new-https-everywhere-add-on/#comments</comments>
        <pubDate>Mon, 29 Nov 2010 18:56:44 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=49217</guid>
        		<category><![CDATA[Browsers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[HTTPS Everwhere]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2010/11/httpseverywhere.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2010/11/httpseverywhere.jpg" alt="Secure Firefox With New HTTPS Everywhere Add-on" /></div>Earlier this year, the Firefox add-on Firesheep created quite a controversy by making it easy to capture unencrypted web traffic. Firesheep sniffs unencrypted cookies sent across open wi-fi networks. That means anyone with Firesheep installed can watch your browsing sessions while you lounge at Starbucks and grab your log-in credentials for Facebook, Twitter or other [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><img src="http://www.webmonkey.com/wp-content/uploads/2010/11/httpseverywhere.jpg" alt="" title="httpseverywhere" /></p>
<p>Earlier this year, the Firefox add-on Firesheep created quite a controversy by making it easy to capture unencrypted web traffic.</p>
<p>Firesheep sniffs unencrypted cookies sent across open wi-fi networks. That means anyone with <a href="http://codebutler.com/firesheep">Firesheep</a> installed can watch your browsing sessions while you lounge at Starbucks and grab your log-in credentials for Facebook, Twitter or other popular sites. Armed with those credentials, anyone using Firesheep can essentially masquerade as you all over the web, logging in to other social sites, blogs and news sites using your Facebook or Twitter username and password.</p>
<p>None of Firesheep&#8217;s mechanisms are new. But Firesheep made sniffing web traffic point-and-click simple &#8212; it was suddenly dead easy to do something that used to require a good bit of hacking knowledge.</p>
<p>The best way to protect yourself from Firesheep is simply avoid connecting to unencrypted sites when you&#8217;re on an open wi-fi network. That means making sure that you connect over HTTPS rather than HTTP everywhere you surf. But sadly, doing so is complicated and depends on which site you&#8217;re trying to connect to.</p>
<p>That&#8217;s where the Electronic Frontier Foundation&#8217;s <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> Firefox add-on comes in. The extension makes it easy to ensure you&#8217;re connecting to secure sites by rewriting all requests to an HTTPS URL whenever you visit one of the sites it supports.</p>
<p>Of course if the website you&#8217;d like to visit doesn&#8217;t support HTTPS, there&#8217;s nothing the add-on can do, but for many big sites &#8212; Twitter, Facebook, Google, PayPal, <em>The New York Times</em>, Bit.ly, Amazon &#8212; HTTPS Everywhere automates the process for you.</p>
<p>With HTTPS Everywhere installed, if you type &#8220;twitter.com&#8221; in the Firefox URL bar, the browser will automatically connect to https://twitter.com rather than http://twitter.com.</p>
<p>That&#8217;s a good start, but it won&#8217;t completely protect you from anyone sniffing with Firesheep. The latest beta release of HTTPS Everywhere, released over the long weekend, improves the add-on&#8217;s protection against Firesheep, but you&#8217;ll need to do some extra stuff.</p>
<p>First, head the HTTPS Everywhere preferences (Tools -> Add Ons -> HTTPS Everywhere -> Preferences) and check the &#8220;Facebook+&#8221; rule. Then install the <a href="http://adblockplus.org/en/">Adblock Plus</a> extension and use it to block the insecure http:// advertisements and tracking sites that Facebook (and other sites) sometimes include. There are <a href="http://www.eff.org/https-everywhere#0.9">more instructions</a> on the EFF&#8217;s site.</p>
<p>Now you can browse Facebook at the coffee shop in relative peace. Certain parts of Facebook may not work properly &#8212; some applications can&#8217;t use HTTPS, and the chat app won&#8217;t work &#8212; but at least you aren&#8217;t broadcasting your login credentials to anyone who wants to listen. The EFF says it has alerted Facebook to the incompatibilities, and that it&#8217;s waiting for Facebook to fix them.</p>
<p><strong>See Also:</strong><br/></p>
<ul>
<li><a href="http://www.webmonkey.com/2010/03/gmail-now-more-secure-with-oauth-support/">Gmail Now More Secure With OAuth Support</a></li>
<li><a href="http://www.webmonkey.com/2010/03/google-chrome-beta-adds-privacy-and-content-controls/">Google Chrome Beta Adds Privacy and Content Controls</a></li>
<li><a href="http://www.webmonkey.com/2010/01/eff_reveals_how_your_digital_fingerprint_makes_you_easy_to_track/">EFF Reveals How Your Digital Fingerprint Makes You Easy to Track</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/11/secure-firefox-with-new-https-everywhere-add-on/feed/</wfw:commentRss>
        <slash:comments>4</slash:comments>

        
    </item>
    
    <item>
        <title>Cryptography</title>
        <link>http://www.webmonkey.com/2010/02/cryptography/</link>
        <comments>http://www.webmonkey.com/2010/02/cryptography/#comments</comments>
        <pubDate>Mon, 15 Feb 2010 20:45:47 +0000</pubDate>

                <dc:creator>Webmonkey Staff</dc:creator>

        <guid isPermaLink="false">http://stag.wired.com/primate/?p=91</guid>
        		<category><![CDATA[Glossary]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[wiki]]></category>
        <description><![CDATA[Cryptography is a constantly changing and evolving field of mathematics that on the internet refers to the practice of encrypting data for safe transmission. Cryptology is the basis for many types of secure transmission over the internet. Regular data is coded into a cipher (which looks like scrambled text) then transmitted and deciphered by the [...]]]></description>

            <content:encoded><![CDATA[<!-- wpautop disabled --><p>Cryptography is a constantly changing and evolving field of mathematics that on the internet refers to the practice of <a href="/2010/02/Encryption" class="new" title="Reference:Encryption">encrypting</a> data for safe transmission.

</p><p>Cryptology is the basis for many types of secure transmission over the internet. Regular data is coded into a cipher (which looks like scrambled text) then transmitted and deciphered by the receiving party.

</p><div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/02/cryptography/feed/</wfw:commentRss>
        <slash:comments>1</slash:comments>

        
    </item>
    
    <item>
        <title>DeCSS</title>
        <link>http://www.webmonkey.com/2010/02/decss/</link>
        <comments>http://www.webmonkey.com/2010/02/decss/#comments</comments>
        <pubDate>Mon, 15 Feb 2010 20:45:47 +0000</pubDate>

                <dc:creator>Webmonkey Staff</dc:creator>

        <guid isPermaLink="false">http://stag.wired.com/primate/?p=97</guid>
        		<category><![CDATA[Glossary]]></category>
		<category><![CDATA[Multimedia]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[wiki]]></category>
        <description><![CDATA[DeCSS is a software program that allows decryption of a CSS-encrypted movie and copying of the files to a hard disc (CSS stands for content scrambling system, and it&#8217;s used to protect the content of a DVD disc.) The DeCSS utility made online trading of DVD movies possible, although the interactive elements and outstanding audio/visual [...]]]></description>

            <content:encoded><![CDATA[<!-- wpautop disabled --><p>DeCSS is a software program that allows decryption of a CSS-encrypted movie and copying of the files to a hard disc (CSS stands for content scrambling system, and it&#8217;s used to protect the content of a DVD disc.) The DeCSS utility made online trading of DVD movies possible, although the interactive elements and outstanding audio/visual quality of DVD are compromised in the process.

</p><div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/02/decss/feed/</wfw:commentRss>
        <slash:comments>2</slash:comments>

        
    </item>
    
    <item>
        <title>PGP</title>
        <link>http://www.webmonkey.com/2010/02/pgp/</link>
        <comments>http://www.webmonkey.com/2010/02/pgp/#comments</comments>
        <pubDate>Mon, 15 Feb 2010 20:45:47 +0000</pubDate>

                <dc:creator>Webmonkey Staff</dc:creator>

        <guid isPermaLink="false">http://stag.wired.com/primate/?p=274</guid>
        		<category><![CDATA[Glossary]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[wiki]]></category>
        <description><![CDATA[Pretty Good Privacy is a flavor of algorithmic encryption that uses two cipher keys, one public and one private. Anyone can use a public key to send a scrambled message to the receiving party. The private key is then used only by the receiving party to unscramble incoming messages. The two-key system was developed by [...]]]></description>

            <content:encoded><![CDATA[<!-- wpautop disabled --><p><br />

Pretty Good Privacy is a flavor of algorithmic <a href="/2010/02/Encryption" class="new" title="Reference:Encryption">encryption</a> that uses two cipher keys, one public and one private. Anyone can use a public key to send a scrambled message to the receiving party. The private key is then used only by the receiving party to unscramble incoming messages. The two-key system was developed by RSA Data Security, Inc. and PGP is the most popular type of two-key encryption available for public, non-commercial use.

</p><div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/02/pgp/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    
    <item>
        <title>EFF Reveals How Your Digital Fingerprint Makes You Easy to Track</title>
        <link>http://www.webmonkey.com/2010/01/eff_reveals_how_your_digital_fingerprint_makes_you_easy_to_track/</link>
        <comments>http://www.webmonkey.com/2010/01/eff_reveals_how_your_digital_fingerprint_makes_you_easy_to_track/#comments</comments>
        <pubDate>Thu, 28 Jan 2010 10:18:36 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/blog/effrevealshowyourdigitalfingerprintmakesyoueasytotrack</guid>
        		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[EFF]]></category>
        <description><![CDATA[Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again. The Electronic Frontier Foundation (EFF) has launched a new web app dubbed Panopticlick that reveals just how scarily easy it is to identify you out of millions of web users. The problem is your digital fingerprint. Whenever [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled --><img class="blogimg" src="http://www.wired.com/images_blogs/epicenter/2010/01/panopticlick.jpg" />Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.</p>
<p>The Electronic Frontier Foundation (EFF) has launched a new web app dubbed <a href="https://panopticlick.eff.org/">Panopticlick</a> that reveals just how scarily easy it is to identify you out of millions of web users.</p>
<p>The problem is your digital fingerprint. Whenever you visit a site, your browser and any plug-ins you have installed can leak data. Some of it isn&#8217;t very personal, like your user agent string. Some of it is more personally revealing, like which fonts you have installed. But the what if you put it all together? Would the results make you identifiable?</p>
<p>As the EFF says, &#8220;this information can create a kind of fingerprint &#8212; a signature that could be used to identify you and your computer.&#8221;</p>
<p>The EFF&#8217;s test suite highlights what most of us probably already suspect &#8212; we&#8217;re readily identifiable on the web. We ran the test on a Mac using Firefox, Safari and Google Chrome, all of which leaked enough data to make us identifiable according the <a href="http://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy">EFF&#8217;s privacy explanations</a>.</p>
<p>The purpose of Panopticlick is to show you how much you have in common with other browsers. The more your configuration mirrors everyone else&#8217;s, the harder it would be to identify you. The irony is, the nerdier you are &#8212; using a unique OS, a less common browser, customizing your browser with plug-ins and other power-user habits &#8212; the more identifiable you are.</p>
<p>For example, say you&#8217;re running Firefox on Ubuntu with the Gnash plug-in instead of Flash &#8212; way to stick it to the man &#8212; but you&#8217;re also showing up with a unique configuration of browser, OS, installed fonts, plug-ins and more which can be combined to identify you via a unique online fingerprint.</p>
<p>So what can you do to make yourself less identifiable? Well, by disabling cookies, the Flash plug-in, the Java plug-in and most of our extensions we were able to blend in better. Actually, the fact that we didn&#8217;t have Java or Flash turned on made us more identifiable in those categories, but it also denied the test access to our installed fonts and other bits of data, so overall, less identifiable.</p>
<p>Obviously that approach has a downside &#8212; without Flash there&#8217;s not much in the way of online video, a lack of cookies will cause issues with logins, and without Java, you won&#8217;t be able to crash your browser or cause it to get hung up for hours.</p>
<p>In short, the disabling method isn&#8217;t much fun. Strange though it may seem, the best way to lose the unique online fingerprint is to blend in with the herd. As the EFF points out, mobile browsers are hardest to identify since there are few customization options and, for the most part, one version of Mobile Safari looks just like another.</p>
<p>By the same token, if you want to blend in, stick with stock system fonts, run Windows XP, use Firefox with no add-ons and turn off cookies. You&#8217;ll be much harder to identify.</p>
<p>We should point out that, no matter how well you blend in the fingerprint test, you are of course still identifiable by your ISP. Advertisers and websites generally can&#8217;t access the information your ISP has on you, but of course governments &#8212; with the cooperation of your ISP &#8212; always can. So don&#8217;t think just because you&#8217;ve eliminated your fingerprints no one knows who you are.</p>
<p><em>Front door photo: <a href="http://www.flickr.com/photos/doctabu/9882724/">Brian Lane Winfield Moore</a>/Flickr (CC)</em></p>
<p><strong>See Also:</strong></p>
<ul>
<li><a href="http://www.webmonkey.com/blog/Protect_Your_Privacy:_Stop_Cache_Tracking_In_Firefox">Protect Your Privacy: Stop Cache Tracking in Firefox</a></li>
<li><a href="http://www.webmonkey.com/blog/Mark_Cuban_And_EFF_Debate_YouTube_And_Copyright">Mark Cuban and EFF Debate YouTube and Copyright</a></li>
<li><a href="http://www.webmonkey.com/blog/Google_Wants_Global_Privacy_Rules">Google Wants Global Privacy Rules</a></li>
<li><a href="http://www.webmonkey.com/blog/Unlike_Google__AskDOTcom_To_Offer_Real_Privacy_Controls">Unlike Google, Ask.com to Offer Real Privacy Controls</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>
]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/01/eff_reveals_how_your_digital_fingerprint_makes_you_easy_to_track/feed/</wfw:commentRss>
        <slash:comments>1</slash:comments>

        
    </item>
    
    <item>
        <title>Warning: This Site May Be Sharing Your Data</title>
        <link>http://www.webmonkey.com/2010/01/creating_a_better_privacy_policy/</link>
        <comments>http://www.webmonkey.com/2010/01/creating_a_better_privacy_policy/#comments</comments>
        <pubDate>Wed, 13 Jan 2010 13:25:49 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/blog/warningthissitemaybesharingyourdata</guid>
        		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[UI/UX]]></category>
		<category><![CDATA[mozilla]]></category>
        <description><![CDATA[Aza Raskin, head of user experience at Mozilla, is leading a charge to make privacy settings more explicit to users by creating visual cues in the browser. Raskin&#8217;s idea uses a set of small icons to denote the limits of a website&#8217;s privacy policy. Raskin likens the idea to how Firefox (and other browsers) currently [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled --><img class="blogimg" src="http://www.wired.com/images_blogs/epicenter/2010/01/home_privacy_200x100b.jpg" />Aza Raskin, head of user experience at Mozilla, is leading a charge  to make privacy settings more explicit to users by creating visual  cues in the browser. Raskin&#8217;s idea uses <a href="http://www.azarask.in/blog/post/is-a-creative-commons-for-privacy-possible/">a  set of small icons</a> to denote the limits of a website&#8217;s privacy policy.</p>
<p>Raskin likens the idea to how  Firefox (and other browsers) currently  handle phishing attack warnings, using visual icons and simple language.</p>
<p>For the active social web user, keeping track of which bits of your data are public and which are private on different sites is a chore. Some websites share your photos, status updates, your list of friends, who you&#8217;re following  and other data on the open web by default. Some share nothing. The rest are somewhere in the middle.</p>
<p>Part of the problem is the privacy policies themselves. They are  complex, mind-numbingly long legal documents. We routinely ignore them, breezing past them by clicking &#8220;I agree.&#8221; Dangerous behavior, indeed.</p>
<p>Raskin and his supporters have borrowed some ideas from the way Creative Commons licensing works, and the way licensing options are denoted on content sites. Originally, the idea was to create a <a href="http://www.azarask.in/blog/post/making-privacy-policies-not-suck/">Creative Commons model for privacy policies</a> &#8212; that is, a common, readable, reusable set of policies much like the <a href="http://creativecommons.org/">Creative Commons licenses</a> for content &#8212; but that plan was abandoned because policies differ too much from site to site. There&#8217;s no easy boilerplate for privacy like there is for content publishing.</p>
<p>But the icon concept remains: A website creates a privacy policy and chooses from a limited set of standard icons that reflect the written policy. Is your profile public by default? Your photos, or status messages? Each setting has its own icon, and the group of settings are indicated by a short stack of icons. The icon set is then detected by the browser and displayed to the user. If there are no icons chosen, the browser offers a warning along the lines of its phishing warning, something like: Be careful, this site might be giving away or selling your data.</p>
<p>Raskin is very clear that, so far, this is a work in progress. There  are, as of yet, no icons designed, and the details of how they would be  implemented remain vague. Nor has Mozilla made any official announcement  that it would support such a system.</p>
<p>However, recent events have proven there&#8217;s clearly a need for a standardized, front-and-center privacy notification system. In December, <a href="http://blog.facebook.com/blog.php?post=190423927130">Facebook began a shift</a> towards looser default privacy settings that encourage users to <a href="http://www.webmonkey.com/blog/Mark_Zuckerberg_on_Privacy_and_the_Future_of_Facebook_News_Feeds">share more of their data</a>. Just last week, Facebook CEO Mark Zuckerberg, in <a href="http://www.ustream.tv/recorded/3848950">an interview</a> with TechCrunch&#8217;s Mike Arrington, noted that people&#8217;s notions of privacy on the social web evolve often, and that social web sites will have to continually update their own privacy policies to reflect those changes. As a result, Facebook&#8217;s new defaults will offer less privacy. Zuckerberg&#8217;s words set off <a href="http://www.theatlanticwire.com/opinions/view/opinion/Facebook-Loses-Face-Over-Self-Serving-Privacy-Policy-2164">a fierce debate</a> on the topic, with Marshall Kirkpatrick of ReadWriteWeb <a href="http://www.readwriteweb.com/archives/why_facebook_is_wrong_about_privacy.php">presenting the clearest counterargument</a> that changing social mores should not lead to looser default privacy settings on the social web.</p>
<p>We&#8217;ve often said the browser is the most logical place to display identity and  privacy information to the user. As people surf from site to site,  they should be able to see, at a glance, what level of privacy they&#8217;re  currently working with. Raskin&#8217;s model sounds like a pretty good plan, though implementing it might be a bit more difficult.</p>
<p>One obvious problem: What&#8217;s to stop a site from using icons that are totally different than what the written policy actually says? Raskin and crew want the icons to supersede the written policy so, in that scenario, the written policy is trumped by the icons and the user retains their rights. Whether or not an icon can legally trump a written document is something Raskin doesn&#8217;t directly address, and, as one commenter points out, the situation gets much more complex when you start considering international legal systems.</p>
<p>If you&#8217;ve got ideas or would like to participate in the discussion, head over to Raskin&#8217;s blog or sign up for the  upcoming privacy workshop hosted at Mozilla on Jan. 27 (see <a href="http://www.azarask.in/blog/post/is-a-creative-commons-for-privacy-possible/">Aza&#8217;s post</a> for full details).</p>
<p><strong>See Also:</strong></p>
<ul>
<li><a href="http://www.webmonkey.com/blog/Mark_Zuckerberg_on_Privacy_and_the_Future_of_Facebook_News_Feeds">Mark Zuckerberg on Privacy and the Future of Facebook News Feeds</a></li>
<li><a href="http://www.webmonkey.com/blog/Google_Wants_Global_Privacy_Rules">Google Wants Global Privacy Rules</a></li>
<li><a href="http://www.webmonkey.com/blog/Protect_Your_Privacy:_Stop_Cache_Tracking_In_Firefox">Protect Your Privacy: Stop Cache Tracking in Firefox</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>
]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/01/creating_a_better_privacy_policy/feed/</wfw:commentRss>
        <slash:comments>20</slash:comments>

        
    </item>
    
    <item>
        <title>Django 1.2 Alpha Offers Multiple Database Support, Improved Security Features</title>
        <link>http://www.webmonkey.com/2010/01/django_1dot2/</link>
        <comments>http://www.webmonkey.com/2010/01/django_1dot2/#comments</comments>
        <pubDate>Fri, 08 Jan 2010 12:46:25 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/blog/django12alphaoffersmultipledatabasesupportimprovedsecurityfeatures</guid>
        		<category><![CDATA[Databases]]></category>
		<category><![CDATA[Frameworks]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[django]]></category>
		<category><![CDATA[Security]]></category>
        <description><![CDATA[Django, the popular web development framework written in Python, has released the first alpha for its much-anticipated new version, Django 1.2. Among the new features coming in Django 1.2 are support for multiple databases &#8212; a key feature for larger websites running Django &#8212; improved security features and a messaging framework that works much like [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled --><img class="blogimg" src="http://www.wired.com/images_blogs/epicenter/2009/07/django-folder.jpg" /><a href="http://www.djangoproject.com/">Django</a>, the popular web development framework written in Python, has released the first alpha for its much-anticipated new version, Django 1.2.</p>
<p>Among the new features <a href="http://docs.djangoproject.com/en/dev/releases/1.2-alpha-1/#what-s-new-in-django-1-2-alpha-1">coming in Django 1.2</a> are support for multiple databases &#8212; a key feature for larger websites running Django &#8212; improved security features and a messaging framework that works much like Ruby on Rail&#8217;s &#8220;flash&#8221; feature.</p>
<p>The multiple database support will likely be the most important part of the next version of Django since it will allow for much easier application scaling. Django 1.2 makes it easy to target individual databases within your apps using some new queryset methods which make it easy to read and write to specific databases.</p>
<p>The security features include much-improved protection against Cross-Site Request Forgery (CSRF) attacks. For more details on how the CSRF protection works, have a look at the <a href="http://docs.djangoproject.com/en/dev/ref/contrib/csrf/#ref-contrib-csrf">new CSRF documentation page</a>.</p>
<p>If you&#8217;d like to test out Django 1.2, or see how your apps run on the new release, head over to the <a href="http://www.djangoproject.com/download/">downloads page</a> or update your Subversion checkout. Keep in mind though that this is still an alpha release and should not be used on production sites. The final release of Django 1.2 is <a href="http://code.djangoproject.com/wiki/Version1.2Roadmap">scheduled to arrive in March 2010</a>.</p>
<p><strong>See Also:</strong></p>
<ul>
<li><a href="http://www.webmonkey.com/blog/Flush_With_Choices__Developers_Still_Dig_Django_the_Most">Flush With Choices, Developers Still Dig Django the Most</a></li>
<li><a href="http://www.webmonkey.com/blog/Latest_Django_Beta_Sets_the_Stage_for_1DOT0_Release">Latest Django Beta Sets the Stage for 1.0 Release</a></li>
<li><a href="/2010/02/Get_Started_With_Django">Get Started With Django</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>
]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/01/django_1dot2/feed/</wfw:commentRss>
        <slash:comments>1</slash:comments>

        
    </item>
    </channel>
</rss>
