Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

1/25/2010
03:07 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

StopBadware Spins Off From Harvard's Berkman Center For Internet & Society

Google, PayPal, Mozilla support nonprofit anti-malware organization

January 25, 2010, Cambridge, Mass. -- StopBadware, an anti-malware effort started at Harvard University's Berkman Center for Internet & Society, announced today that it has begun operating as a standalone non-profit organization. Google, PayPal, and Mozilla have together committed the initial funding to support the launch of StopBadware, Inc.

StopBadware began four years ago today as an ambitious Berkman Center project intended to engage the Internet community in fighting what the organization refers to as badware -- software such as viruses or spyware that disregard a user's choice about how his or her computer or network connection will be used. The goal was and remains to build and share knowledge through the collective efforts of a community of web users.

StopBadware works with its network of organizations and individual volunteers to collect and analyze data, to build community momentum for fighting badware, and ultimately to advocate for change. "If we want to put an end to badware -- or even put a dent in it -- we have to change the attitudes and behaviors of individuals, organizations, and governments," said Maxim Weinstein, StopBadware's executive director. "That's no small task, but we know progress is possible by combining the creativity and passion of our BadwareBusters.org community members with the hard facts derived from our Badware Website Clearinghouse."

The decision to spin StopBadware off from the Berkman Center was made in recognition of the effort's evolution from research project to mission-driven organization. "StopBadware has grown in just a few years from the seed of an idea into an internationally recognized force in the fight against harmful software," said Urs Gasser, executive director of the Berkman Center. "We are proud that, by developing a unique mission and becoming independent, StopBadware now follows in the footsteps of previous ventures like Creative Commons and Global Voices that have their roots here at the Berkman Center. We're grateful for the inspiration and guidance of the project's leaders, professors Jonathan Zittrain and John Palfrey."

Palfrey will serve on the new non-profit's board of directors, along with Michael Barrett (PayPal), Vint Cerf (Google), Esther Dyson, Mike Shaver (Mozilla), Ari Schwartz (Center for Democracy & Technology), and executive director Maxim Weinstein.

StopBadware has already had success in its goal of changing attitudes and behaviors. Its "badware alerts," which highlight applications that violate its badware guidelines, have led major corporations -- including AOL, Real Networks, and Sears Holding Corporation -- to make changes to their software to protect customer choice. Its collaboration with Google in warning users about websites that can install malware on visitors' computers, and in assisting with the remediation and prevention of such compromised sites, has increased awareness of the role individual site owners can play in reducing the spread of malware.

"There is still much to do. Badware remains a growing problem, but in the past few years, there's also been a growing sense that this is a problem we -- the Internet community -- can and should work together to address. StopBadware is committed to making that happen," said Weinstein.

About StopBadware StopBadware is a non-profit organization that works with its network of individuals and partner organizations -- including Google, PayPal, and Mozilla -- to fight back against viruses, spyware, and other badware. The organization began as a project of the Berkman Center for Internet & Society at Harvard University before spinning off as a standalone organization in 2010. It is based in Cambridge, Massachusetts. http://stopbadware.org

About the Berkman Center for Internet & Society The Berkman Center for Internet & Society at Harvard University is a research program founded to explore cyberspace, share in its study, and help pioneer its development. Founded in 1997, through a generous gift from Jack N. and Lillian R. Berkman, the Center is home to an ever-growing community of faculty, fellows, staff, and affiliates working on projects that span the broad range of intersections between cyberspace, technology, and society. More information can be found at http://cyber.law.harvard.edu.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5148
PUBLISHED: 2021-03-05
SonicWall SSO-agent default configuration uses NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall a...
CVE-2020-36255
PUBLISHED: 2021-03-05
An issue was discovered in IdentityModel (aka ScottBrady.IdentityModel) before 1.3.0. The Branca implementation allows an attacker to modify and forge authentication tokens.
CVE-2019-18351
PUBLISHED: 2021-03-05
An issue was discovered in channels/chan_sip.c in Sangoma Asterisk through 13.29.1, through 16.6.1, and through 17.0.0; and Certified Asterisk through 13.21-cert4. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijac...
CVE-2021-27963
PUBLISHED: 2021-03-05
SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g., SuperAdmin). An anonymous user can send a POST request to /User/saveUser without any authentication or session header.
CVE-2021-27964
PUBLISHED: 2021-03-05
SonLogger before 6.4.1 is affected by Unauthenticated Arbitrary File Upload. An attacker can send a POST request to /Config/SaveUploadedHotspotLogoFile without any authentication or session header. There is no check for the file extension or content of the uploaded file.