Feeds

Personal storage sites are a 'safe haven for hackers'

Censorware firm apes Mary Whitehouse

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Websense, the employee management software outfit that's become best known for heaping FUD on emergent net technolgies, has found a new target. Hot on the heels of charecterising online storage sites as a conduit for industrial espionage and blogs as a host of malware it's decided to chastise personal web hosting sites as a "Safe Haven for Hackers".

Since the beginning of 2005, Websense Security Labs has discovered more than 2,500 incidents of these websites distributing MMC, Trojan horses and keyloggers. The recently uncovered malware-harbouring sites (many in the UK or Brazil) include those available for hosting online journals, photo albums, greeting cards, music, sports 'fan' pages and online scrapbooks, among many other popular purposes. Websense doesn't try to balance incidents of security problems it has discovered against the wider use of the hosted web sites for their intended purposes.

And why should it? After all the agenda here is to promote Websense Web Security Suite as a way of helping firms to control a wide range of computing habits. If Websense has its way, visiting personal web hosting sites would join the list of proscribed workplace Internet activities, including swapping files, instant messaging and online gaming as unacceptable security and liability risks. Many of these have been the subject of recent Websense surveys and, in fairness, the company has some valid points about legal liabilities, bandwidth management and security risks inherent in some of these activities.

God forbid IT news sites should turn out to be next on their hit list - otherwise how will they get their scary messages out to the public.®

Related stories

Beware of toxic blogs
Memory sticks are the latest security risk
Websense wants to ban online gaming
Personal storage sites are the latest security risk
Your data is at risk - from everything

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.