Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:35 AM
Connect Directly

Website Security Seals Get a Boost

McAfee's purchase of ScanAlert could bring more big players, and better technology, to Website security seal programs

Some security experts have dismissed Website seals such as Hacker Safe and ControlScan as more marketing ploy than security, and hackers have fueled the debate by exposing cross-site scripting vulnerabilities on sites proudly emblazoned with seals from Hacker Safe and other security seal providers. (See Hackers Reveal Vulnerable Websites and Are 'Sealed' Websites Any Safer?.)

But ScanAlert's Hacker Safe seal -- and security Good Housekeeping seals overall -- could gain more credibility now, with McAfee's announcement today that it intends to buy ScanAlert for $51 million. Even with its critics, ScanAlert's Hacker Safe seal has captured plenty of business -- the seal is stamped on 75,000 Websites, and the company has 8,000 customers, including Petco, Toshiba, and Warner Brothers -- with its security scanning service. (See McAfee to Acquire ScanAlert.)

Todd Gebhart, senior vice president and general manager of McAfee's consumer and mobile small business unit, says that the company plans to enhance and expand Hacker Safe's vulnerability scanning technology, using its own enterprise-class vulnerability scanning technology under its Foundstone unit, as well as making future enhancements to ScanAlert's service. "We will be augmenting what they do... We intend to keep their technology involved and improving and evolving," Gebhart says.

Still, critics say Hacker Safe is more of a least-common denominator checkbox. "Lots of security people feel that ScanAlert’s business model preys on the low-hanging fruit of the PCI fallout -- people trying to do the least possible to get by. While I think they are a good low-cost solution to getting into compliance, I don’t think ScanAlert is doing much in the way of actual security mitigation," says Robert Hansen, aka RSnake, and CEO of SecTheory LLC.

Andrew Jacquith, senior security analyst with The Yankee Group, says the problem is there's a limit to what these security seal programs can provide for the money. "Hacker Safe costs a few thousand dollars, and it's an automated scan. You are only going to get a least-common denominator assurance for something like that -- making sure that you are practicing 'good hygiene,' like making sure your servers are patched, that there aren't any really obvious Web server config issues, and the like," Jacquith says. "This is a lot better than nothing, but not as good as a real assessment by a professional security analyst."

Still, research has shown that Websites with these seals do get more business, so despite their technical shortcomings, these seals do provide consumers some reassurance of a site's security. ScanAlert claims that its customers realize an approximate 14 percent increase in transaction conversion rates. "The data is pretty conclusive that certified sites get more transactions than those that are not certified," McAfee's Gebhart says. "One thing we can bring to the acquisition is our name behind it, our technology to bear, and more folks will adopt this. It's in their best interest."

But these programs can't survive on consumer psychology alone, however, experts say. "I really think McAfee is going to have to put a significant investment into ScanAlert -- of similar quality to its Foundstone offerings -- to bring [Hacker Safe] up to a respectable ability to find vulnerabilities, otherwise [Hacker Safe] will continue to be a joke amongst the hardcore security community," SecTheory's Hansen says.

The McAfee name behind the Hacker Safe seal could open the floodgates to further consolidation and cooperation in other security seal programs, Yankee Group's Jacquith predicts. "I think we might see some more creative acquisitions and joint ventures in this space," he says. "Perhaps somebody like RSA or Symantec buys TrustE, or partners with the Better Business Bureau to run their [seal] program. You'd have to put Qualys on the list of potential partners or acquisition targets, too."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • McAfee Inc. (NYSE: MFE)
  • ScanAlert Inc.
  • SecTheory LLC
  • Yankee Group Research Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    7 Old IT Things Every New InfoSec Pro Should Know
    Joan Goodchild, Staff Editor,  4/20/2021
    Cloud-Native Businesses Struggle With Security
    Robert Lemos, Contributing Writer,  5/6/2021
    Defending Against Web Scraping Attacks
    Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: Take me to your BISO 
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-05-10
    In YzmCMS 5.6, XSS was discovered in member/member_content/init.html via the SRC attribute of an IFRAME element because of using UEditor
    PUBLISHED: 2021-05-10
    In YzmCMS 5.6, stored XSS exists via the common/static/plugin/ueditor/ action parameter, which allows remote attackers to upload a swf file. The swf file can be injected with arbitrary web script or HTML.
    PUBLISHED: 2021-05-10
    Cross-site scripting (XSS) vulnerability in static/admin/js/kindeditor/plugins/multiimage/images/swfupload.swf in noneCms v1.3.0 allows remote attackers to inject arbitrary web script or HTML via the movieName parameter.
    PUBLISHED: 2021-05-10
    Cross-site scripting (XSS) vulnerability in admin/nav/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.
    PUBLISHED: 2021-05-10
    Cross-site scripting (XSS) vulnerability in admin/article/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.