Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
This  level-4 vital article is rated C-class on Wikipedia's content assessment scale.
It is of interest to the following WikiProjects:WikiProject iconComputer Security: Computing Top‑importance
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
TopThis article has been rated as Top-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (assessed as High-importance).
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Answer question about Same-origin_policy
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconCrime and Criminal Biography High‑importance
WikiProject iconThis article is within the scope of WikiProject Crime and Criminal Biography, a collaborative effort to improve the coverage of Crime and Criminal Biography articles on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
HighThis article has been rated as High-importance on the project's importance scale.
WikiProject iconComputing High‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
HighThis article has been rated as High-importance on the project's importance scale.
WikiProject iconComputer science High‑importance
WikiProject iconThis article is within the scope of WikiProject Computer science, a collaborative effort to improve the coverage of Computer science related articles on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
HighThis article has been rated as High-importance on the project's importance scale.
Things you can help WikiProject Computer science with:

WikiProject iconSoftware: Computing High‑importance
WikiProject iconThis article is within the scope of WikiProject Software, a collaborative effort to improve the coverage of software on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
HighThis article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (assessed as High-importance).
WikiProject iconInternet High‑importance
WikiProject iconThis article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the Internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
HighThis article has been rated as High-importance on the project's importance scale.

For comedic purposes

edit

There are many "strains" of malware that are open about the fact that they are malware and are intended to entertain the end user. Some examples include MEMZ and many others created for YouTuber Danooct1's Viewer-Made Malware series and Twitch Streamer Joel "Vargskelethor" Johansson's Windows Destruction streams. We should talk about them. — Preceding unsigned comment added by DatGuyonYouTube (talkcontribs) 14:55, 5 March 2018 (UTC)Reply

==

site URL goes to this Wikipedia page ==

I informed Wikipedia through the e-mail [email protected], but I also believe everyone should be able to read it here.

Zionist Jews hacked the site of the honest and trustable Orthodox Jews because they want to shut them up for telling the truth about them.

Their home page URI, http://www.nkusa.org/index.cfm Goes to this Malware page: https://en.wikipedia.org/wiki/Malware

This is all.

2001:8A0:67E9:9801:30C0:9756:585D:F705 (talk) 20:57, 19 May 2018 (UTC)Reply

Antivirusgratis.org: bona fide? good site?

edit

In https://en.wikipedia.org/w/index.php?title=Malware&curid=20901&diff=857672483&oldid=855164213 , User:78.14.138.242 (in their only contribution to WP) added three links to antivirusgratis.org. Is this a bona fide site? Also, if I follow the link to https://www.antivirusgratis.org/, my Firefox tells me:

Content Encoding Error
The page you are trying to view cannot be shown because it uses an invalid or unsupported form of compression.
Please contact the web site owners to inform them of this problem.

If I look at the archive https://web.archive.org/web/20180412214339/https://www.antivirusgratis.org/, I see that it is/was a Spanish-language site; that seems to me probably sufficient reason to remove these links, but I have not actually done so (so far). PJTraill (talk) 10:45, 3 September 2018 (UTC)Reply

Internet of Things (IOT) / user understanding / " Hazardware": notable?

edit

In this revision, @Aegean Blue Sea: added this unsourced description of "Hazardware", considerably copy-edited by me:

Prof Sean S. Costigan and Dr Dinos A. Kerigan-Kyrou (of the Partnership for Peace Consortium and the Marshall Center) have proposed the concept of "Hazardware". This refers to apps and IoT devices given authorization by a user who does not understand the scope or consequences. For example, a messaging app on a phone is likely to require permission to access the user's microphone and camera. The user may assume that the app will only access the microphone or camera when they make a voice or video call or take a photo. However, their permission allows the app to access the camera and microphone at any time. The security implications of Hazardware are substantial for military and business organisations and particularly the user of the app or device.

@Bruce1ee: reverted this with Twinkle saying please provide a source, which I thought might be a little abrupt and discouraging: on the one hand this article does seem to attract low-quality and dubious additions, but on the other, the topics of IoT and user understanding seem relevant but are barely touched on here. I found the probable source of this contribution at the sometimes criticised site academia.edu.[1] As I write the authors are unknown to Wikipedia. Dinos A. Kerigan-Kyrou I could not read the publication¿s? without registering, which I was reluctant to do, given Academia.edu § Criticism and the conflicting ratings by Web of Trust users, but I imagine it is probably bona fide. The term "hazardware" was not found by the authors' organisations' sites' search functions,[2], so the connection seems uncertain. Searching the internet for "hazardware", I only found the above revision of this article, the above paper¿s? and other meanings such as a dodgy assembly of components[3].

Can we not nonetheless make use of the above ideas?

PJTraill (talk) 10:42, 28 November 2018 (UTC)Reply

References

Certainly we can make use of the above ideas, provided they can be backup up with reliable sources. I also did a quick search for "hazardware" and not much that could be considered reliable came up. You're right, I may have been "a little abrupt and discouraging", but the edit come across as original research, and this article does tend to be a magnet for dubious additions. —Bruce1eetalk 13:28, 28 November 2018 (UTC)Reply
After my recent changes have just been reverted by User:Aegean Blue Sea I've popped a gentle warning on their talk page. -Snori (talk) 17:25, 6 December 2018 (UTC)Reply

Website Vulnerability Scans

edit

I read this section and edited out a preamble that I thought extraneous, but am reflecting that Website Vulnerability Scans are more to do with checking the site for coding errors that could leave the site vulnerable to crafted attacks. By and large malware attacks the computers that host websites rather than the site itself. Maybe that whole section is extraneous? I didn't feel quite confident to delete it.