Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/17/2011
12:44 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Majority Of Websites Fail To Deploy Online Trust Measures

Social media, e-commerce, financial services ahead of federal agencies in protecting consumers online, Online Trust Alliance report says

Three-fourths of all organizations failed to make the grade for protecting users from malicious email and rogue websites in the Online Trust Alliance's (OTA) newly released 2011 Online Safety Honor Role.

Only 26 percent of government, social media, e-commerce, and financial services firms surveyed by the OTA made the honor roll for using technologies to prevent abuse, including email authentication, Extended Validation SSL Certificates (EV SSL), and malware and vulnerability testing on their websites. But that's still an improvement over last year, when only 8 percent did. The OTA surveyed 1,112 domains, their DNSes, and more than 500 million email messages that claimed to originate from those organizations.

Craig Spiezle, executive director and president of the OTA, says there's some good news in that there are higher levels of adoption of email authentication and EV SSL certificates, as well as a decreased level of malware and known vulnerabilities on some websites. "This reflects how website administrators are locking down their sites better," he says. "But the bad news is that cybercrime is moving upstream: [Spoofing and phishing] email authentication is at the forefront of attacks today, and there are still not enough gains here. The glass is still half empty."

According to the report, social media, e-commerce, and financial services ranked higher in securing their sites than government agencies. Around 27 percent of the top 100 FDIC banks made the honor roll, while 24 percent of the Fortune 500 did, and 22 percent of the top 500 Internet retailers. Just 12 percent of federal government websites made the honor roll.

More than 56 percent of all of those surveyed are now using either Sender Policy Framework (SPF) or DomainKeys Identified Mail (DKIM) for detecting and blocking phony email. More than 90 percent of the top social media sites have adopted email authentication; 84 percent of the top online retailers; 59 percent of the largest FDIC banks; and 38 percent of the top government sites. The good news is that the feds have increased their adoption of email authentication by nearly 19 percent since 2010's report.

"We applaud OTA's efforts to drive adoption of standards-based security best practices and we are honored to be recognized for our leadership in customer protection," said Michael Barrett, CISO and vice president of information risk management at PayPal, in a statement. "We encourage other industry stakeholders to join us in deploying these solutions for the sake of our mutual customers’ safety, and the vitality of our ecosystem. The time is now."

The OTA lists the Internal Revenue Service, the Social Security Administration, Apple, Citibank, Bank of America, PayPal, Publishers Clearing House, Microsoft, and the White House (whitehouse.gov) for implementing the proper best practices to ensure online consumer safety and privacy.

Spiezle says organizations must consider adopting the proper technologies to protect against phishing, email fraud, and breaches. "Look at Comodo: That's a good example of spear-phishing. The data you collect [online] has personal and sensitive information," he says. "You will have an incident. You will be targeted ... The challenge today is a lot of people are in denial."

The OTA report and scorecard is available here for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17660
PUBLISHED: 2019-10-16
A cross-site scripting (XSS) vulnerability in admin/translate/translateheader_view.php in LimeSurvey 3.19.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the tolang parameter, as demonstrated by the index.php/admin/translate/sa/index/surveyid/336819/lang/ PATH_INFO.
CVE-2019-11281
PUBLISHED: 2019-10-16
Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input...
CVE-2019-16521
PUBLISHED: 2019-10-16
The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payl...
CVE-2019-16522
PUBLISHED: 2019-10-16
The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. A...
CVE-2019-16523
PUBLISHED: 2019-10-16
The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin.