{"id":43,"date":"2007-05-20T22:19:29","date_gmt":"2007-05-20T22:19:29","guid":{"rendered":"http:\/\/hakawitech.wordpress.com\/2007\/05\/20\/the-ghost-in-the-browser\/"},"modified":"2007-05-20T22:19:29","modified_gmt":"2007-05-20T22:19:29","slug":"the-ghost-in-the-browser","status":"publish","type":"post","link":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/","title":{"rendered":"the ghost in the browser"},"content":{"rendered":"<p style=\"text-align:center;\"><img decoding=\"async\" src=\"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif\" alt=\"google.gif\" \/><\/p>\n<p><strong>Google <\/strong>just released a study entitled <a href=\"http:\/\/http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/provos\/provos.pdf\" target=\"_blank\"><strong>The Ghost in the Browser: Analysis of web-based malware<\/strong><\/a> [<em>pdf document<\/em>] in which it claims that 10% of websites contain malicious malware. It conducted an &#8220;in-depth research on 4.5 million Web sites and found that about one in 10 Web pages could successfully &#8220;drive-by download&#8221; a Trojan horse virus onto a visitor&#8217;s computer. Such malicious software potentially enables hackers to access sensitive data stored on the computer or its network, or to install rogue applications.&#8221; [<a href=\"http:\/\/news.com.com\/Google+10+percent+of+sites+are+dangerous\/2100-7349_3-6183818.html?tag=cd.top\" target=\"_blank\"><em>cnet news<\/em><\/a>]<\/p>\n<p>Not only that, but according to another article on cnet,<\/p>\n<blockquote><p>An average of 8,000 new URLs containing malicious software emerged each week during April, Cluley said, adding that the notion that such software resides only in the darker corners of the Internet is very outdated. Seventy percent of Web pages hosting rogue software are found on <a href=\"http:\/\/news.com.com\/Web+attackers+get+better+at+hiding\/2100-7349_3-6177424.html\" target=\"_blank\" title=\"Web attackers get better at hiding -- Wednesday, Apr 18, 2007\">legitimate sites targeted by hackers<\/a>, according to Sophos.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Google just released a study entitled The Ghost in the Browser: Analysis of web-based malware [pdf document] in which it claims that 10% of websites contain malicious malware. It conducted an &#8220;in-depth research on 4.5 million Web sites and found <a href=\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,21,33],"tags":[],"class_list":["post-43","post","type-post","status-publish","format-standard","hentry","category-browsers","category-google-news","category-securityprivacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>the ghost in the browser - Education and Technology Hub<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"the ghost in the browser - Education and Technology Hub\" \/>\n<meta property=\"og:description\" content=\"Google just released a study entitled The Ghost in the Browser: Analysis of web-based malware [pdf document] in which it claims that 10% of websites contain malicious malware. It conducted an &#8220;in-depth research on 4.5 million Web sites and found Read More ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/\" \/>\n<meta property=\"og:site_name\" content=\"Education and Technology Hub\" \/>\n<meta property=\"article:published_time\" content=\"2007-05-20T22:19:29+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif\" \/>\n<meta name=\"author\" content=\"mtadros\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mtadros\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/\",\"url\":\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/\",\"name\":\"the ghost in the browser - Education and Technology Hub\",\"isPartOf\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif\",\"datePublished\":\"2007-05-20T22:19:29+00:00\",\"author\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b\"},\"breadcrumb\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#primaryimage\",\"url\":\"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif\",\"contentUrl\":\"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/virtualactivism.org\/education\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"the ghost in the browser\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#website\",\"url\":\"https:\/\/virtualactivism.org\/education\/\",\"name\":\"Education and Technology Hub\",\"description\":\"Technology and Education Resources\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/virtualactivism.org\/education\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b\",\"name\":\"mtadros\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g\",\"caption\":\"mtadros\"},\"url\":\"https:\/\/virtualactivism.org\/education\/author\/mtadros\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"the ghost in the browser - Education and Technology Hub","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/","og_locale":"en_US","og_type":"article","og_title":"the ghost in the browser - Education and Technology Hub","og_description":"Google just released a study entitled The Ghost in the Browser: Analysis of web-based malware [pdf document] in which it claims that 10% of websites contain malicious malware. It conducted an &#8220;in-depth research on 4.5 million Web sites and found Read More ...","og_url":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/","og_site_name":"Education and Technology Hub","article_published_time":"2007-05-20T22:19:29+00:00","og_image":[{"url":"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif","type":"","width":"","height":""}],"author":"mtadros","twitter_card":"summary_large_image","twitter_misc":{"Written by":"mtadros","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/","url":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/","name":"the ghost in the browser - Education and Technology Hub","isPartOf":{"@id":"https:\/\/virtualactivism.org\/education\/#website"},"primaryImageOfPage":{"@id":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#primaryimage"},"image":{"@id":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#primaryimage"},"thumbnailUrl":"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif","datePublished":"2007-05-20T22:19:29+00:00","author":{"@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b"},"breadcrumb":{"@id":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#primaryimage","url":"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif","contentUrl":"http:\/\/hakawitech.files.wordpress.com\/2007\/05\/google.gif"},{"@type":"BreadcrumbList","@id":"https:\/\/virtualactivism.org\/education\/the-ghost-in-the-browser\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/virtualactivism.org\/education\/"},{"@type":"ListItem","position":2,"name":"the ghost in the browser"}]},{"@type":"WebSite","@id":"https:\/\/virtualactivism.org\/education\/#website","url":"https:\/\/virtualactivism.org\/education\/","name":"Education and Technology Hub","description":"Technology and Education Resources","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/virtualactivism.org\/education\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b","name":"mtadros","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g","caption":"mtadros"},"url":"https:\/\/virtualactivism.org\/education\/author\/mtadros\/"}]}},"_links":{"self":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts\/43","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/comments?post=43"}],"version-history":[{"count":0,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts\/43\/revisions"}],"wp:attachment":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/media?parent=43"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/categories?post=43"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/tags?post=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}