Back to Results
First PageMeta Content
Computer network security / StopBadware / MPack / Application security / Antivirus software / Vulnerability / Computer virus / Web threat / Gumblar / Malware / Cyberwarfare / Computing


Reinterpreting the Disclosure Debate for Web Infections Oliver Day1 , Brandon Palmen1 , and Rachel Greenstadt2 1 StopBadware Project
Add to Reading List

Document Date: 2008-05-09 10:18:19


Open Document

File Size: 437,59 KB

Share Result on Facebook

Company

Google / StopBadware / /

Country

United States / China / /

Currency

USD / /

/

Event

Product Issues / /

IndustryTerm

web scripts / particular web hosting providers / web gatekeepers / Internet service providers / dubious advertising networks / web host / web applications / web users / software vendors / illicit software / malware server / publisher advertising networks / secure web hosts / target software vulnerabilities / malware network / media piracy / ad networks / Internet stakeholders / software guidelines / midtier web / standardized software / exploit server / web browsers / exploited Internet users / shadowy web hosts / Internet malware landscape / functional solutions / web browser / basic shared web hosting packages / database applications / vulnerable software products / advertising network / web hosting / vulnerable server / software developers / software updates / affiliate network / make web security / web service / web consumers / affiliate networks / software vulnerability exploitation / Internet end-users / particular applications / software packages / malicious software / malware infection technologies / exploit solutions / low-margin web hosts / shared web hosting services / mid-tier web hosts / software dependencies / shared web host / software vulnerability / lax web security / web hosting providers / credibility Internet users / web content providers / web properties / malware affiliate networks / software security vulnerabilities / open-source content management systems / iframe-based advertising networks / compromised web page / advised web users / Internet technology / web hosting market / compromised web sites / bpalmen@cyber.law.harvard.edu / off-theshelf software products / borderline applications / search products / application software / web publishing techniques / search engines / private malware distribution network / malware distribution networks / particular web host / software platforms / Internet security / topical discussion forum / returned search results / consumer applications / web infection space / software vulnerabilities / offthe-shelf server control-panel software / Web Hosts With / law enforcement / bot networks / Internet consumers / oday@cyber.law.harvard.edu / web code / Internet users / physical server / Internet Explorer vulnerability / untrusted software / web server technologies / insecure web hosts / Internet user / web hosts / search results / e-commerce applications / unknown applications / Web Infections Oliver Day1 / Internet Explorer / /

Organization

Center for Research / Harvard University / StopBadware Project Berkman Center for Internet / /

Position

webmaster / entrepreneur / consumer webmaster / inexperienced webmaster / /

Product

defenses / standardized software / /

ProgrammingLanguage

HTML / JavaScript / /

Technology

web server technologies / malware infection technologies / Internet technology / HTML / web publishing / content management / /

SocialTag