Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

6/29/2017
09:00 AM
Dawn Kawamoto
Dawn Kawamoto
Slideshows
50%
50%

How To (And Not To) Make the Online Trust Honor Roll

Five websites generated the highest score in their sector for the 2017 Online Trust Audit & Honor Roll. Here is what it takes to get there and be listed among the Online Trust Alliance's Top 50
Previous
1 of 7
Next

With consumer and enterprise sites getting slammed with attacks, the Online Trust Alliance recently unveiled its 2017 Online Trust Audit & Honor Roll to highlight those sites that engage in the best security and privacy practices.

The audit analyzed up to 1,000 consumer-related websites, Internet service providers, mobile carriers, email box providers, government agencies, and media sites, based on three key criteria: privacy, consumer protection, and security and resiliency. The total base points possible stood at 300, excluding bonus points, and a website needed to score at least 80% overall to be included in the honor roll.

"It's all about following the basics," says Craig Spiezle, executive director and president of the Online Trust Alliance (OTA).

In the security and resiliency category those "basics" include not only patching, but also: having a Secure Socket Layer (SSL) infrastructure; providing a link on the home page to report bugs and search for such common terms like "vulnerability disclosures"; a means to protect against web scraping, vulnerability scanning, and other common bot-driven actions; and an option for multi-factor authentication on the site.

Privacy criteria encompass policies and practices around user anonymity, data retention, and third-party data sharing.

Consumer protection was rated based upon measures like email authentication, anti-phishing technologies and domain security. 

Given these criteria, the five websites that received the highest score for their sector included: LifeLock, for the consumer category; US Bank, for the FDIC or bank category, Microsoft Azure, for the ISPs, mobile carriers, and hosters section; Google News for the news and media category; and the Online Trust Alliance for the OTA members section.

The issue of which websites scored the highest for their respective category or made it onto the OTA honor roll is only part of the story. The overall trends for success and failure of achieving security and privacy on a website is the other important part of the picture that will be revealed in the following pages.

 

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ...
View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
7/31/2017 | 2:46:22 PM
Re: impersonization, forgery, and fakes
100% behind you here, mack.  There is room for the Public Key Model to improve, of course.  Read an interesting paper "Soundness in the Public-Key Model" by Silvio Micali and Leonid Reyzin.  From the ABSTRACT:

The public-key model for interactive proofs has proved to be quite effective in improving protocol efficiency (see Canetti, Goldreich, Goldwasser, Micali, STOC 2001). We argue, however, that its soundness notion is more subtle and complex than in the classical model, and that it should be better understood to avoid designing erroneous protocols. Specifically, for the public-key model, we:

 
  • identify four meaningful notions of soundness;
  • prove that, under minimal complexity assumptions, these four notions are distinct;
  • identify the exact soundness notions satisfied by prior interactive protocols; and
  • identify the round complexity of some of the new notions.
macker490
100%
0%
macker490,
User Rank: Ninja
7/18/2017 | 8:21:33 AM
impersonization, forgery, and fakes
what do the sites do to prevent the "Bad Guys" from impersonating them -- or transmitting fakes and forgeries?

sites focus tons of effort on identifying their customers.    but what do customers do in order to authenticate sites?

we rely on a large list of x.509 certificates -- published by our web browsers  -- and most of us -- have no clue what's in that list.

For Critical Sites Only:    we all need to COUNTERSIGN trusted certificates using our own PGP/GnuPG key

in the Public Key Model this step is required in order to validate a key.   Keys must be validated before a trust level can be assigned.

give this some thought.   "They" want to authenticate you -- but -- you need to authenticate them -- and the model we use today -- fails.   That's an F
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Google Cloud Debuts Threat-Detection Service
Robert Lemos, Contributing Writer,  9/23/2020
Shopify's Employee Data Theft Underscores Risk of Rogue Insiders
Kelly Sheridan, Staff Editor, Dark Reading,  9/23/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25772
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25773
PUBLISHED: 2020-09-29
A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to execute arbitrary code on affected products. User interaction is required to exploit this vulnerability in that the target must import a corrupted configuration file.