Unfortunately, that's not the case anymore. Just as we've adapted our methods of protection, attackers have done the same. First they began targeting sites that users trusted to be safe from malware. They would compromise the site, add their malicious code, and wait for the victims to pile up.
Next came malicious advertising, or malvertising. Attackers were finding it wasn't always so easy to hack the trusted site. Either the security was solid or changes to Web content were noticed immediately. So they adapted by delivering their malicious code via third-party advertisers. Popular sites like The New York Times and Gizmodo are examples of sites hit by malvertising.
After I explained those scenarios to users, they again asked the same question: How do I know whether a site is safe? My first recommendation was to follow standard defense methods I've been teaching, which include not running as an administrator, keeping your operating system and third-party applications patched, and keeping your antivirus updated and run daily scans.
Once they're patching, updating AV, and running as a nonprivileged user, then we talk about determining site safety. There are several companies that try to monitor the "badness" of a site by scanning and monitoring for malicious content. McAfee's SiteAdvisor and Web of Trust are two that come to mind. They have a search function that lets you put in the domain in question to find out whether malicious content has been seen on that site and how recently it was seen.
Both Microsoft and Mozilla include some functionality in their browsers to alert when a user is visiting a site that has been reported to have malicious content or been used for phishing attacks. Additionally, there are browser toolbars that provide additional functionality for determining whether a site is good or bad. ThreatExpert has a good one called BrowserDefender, which has integration with popular search engine results to give you the ranking of a site. McAfee and Web of Trust also have software that can provide similar functionality.
There's still the chance something can slip through one of those tools, but by being aware of the threats and having defensive measures in place, users will stand a better chance of not getting their systems owned...both at work and at home.
John H. Sawyer is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.