The Role of Web Hosting Providers in Detecting Compromised Websites

Download Now
Provided by: Association for Computing Machinery
Topic: Security
Format: PDF
Compromised websites are often used by attackers to deliver malicious content or to host phishing pages designed to steal private information from their victims. Unfortunately, most of the targeted websites are managed by users with little security background often unable to detect this kind of threats or to afford an external professional security service. In this paper the authors test the ability of web hosting providers to detect compromised websites and react to user complaints. They also test six specialized services that provide security monitoring of web pages for a small fee.
Download Now

Find By Topic