Yes I do and I guess according to them, it’s not a safe place to go.

No problem with the link either, not using OpenDNS either.

Can’t see why OpenDNS would object to this, however would also depend on what your dashboard settings are if you have any set.

Well, usually it’s one of the safest places to go…!!! :wink:
http://en.wikipedia.org/wiki/Tor_(anonymity_network)
https://www.torproject.org/index.html.en

Im using OpenDNS and that link is not blocked for me but im not using the dashboard settings, just the basic DNS addresses.

Its definitly not a safe place to go according to OpenDNS!

I just removed that filter and now the site shows.
Apparently the blog likes to hide its whereabouts.

CharlieO,

Just clicked the above link, and got a text page of some sort just before the intended site appeared and loaded as “Washington Post”. Do not know what I saw, but when I saw it, I went, oh no!, as this behavior may describe exactly the problem you are referring to.

As I run my browser sandboxed, it does not appear to be affected.

Do you see the same behavior?

mchain

XP Home Edition SP3 P4 2.8 2GB RAM Avast! Free 6.0.1203

Slammed with a lifetime ban
http://www.theregister.co.uk/2011/09/03/diginotar_game_over/

more on the above

Secure browsing turns insecure (again)
http://www.norman.com/security_center/security_center_archive/2011/secure_browsing_turns_insecure_again/en

Gargamel360 and Pondus,

Shoot, just when I mistakenly thought things might get better! It would seem that what is needed is for most, if not all, ip traffic to be https: once the issues are worked out with security certificates.

I know, I know, then the model of an open internet would be lost, but how does the average user today protect themselves from a corrupt and malicious nation-state, or even be aware that such a problem or situation exists?

The original model of the internet was for, among other things, military security and communications in the beginning, but as time has gone by, and as things have changed and progressed, I am beginning to think that this original model is sordidly archaic and obsolete, and that very ominous and dark clouds and storms are just forming beyond the horizon, unseen, unheard, and unfelt. These threats are becoming more real by the minute, and the need for those to preserve the world as a safe place for freedom is becoming more dire with each passing moment. The only way to know for sure that you are talking to who you think you are is now intrinsically intertwined with the validity of a security certificate. And, even then…

And the Iranian government is denying this right to it’s own citizens? What, pray tell, is the value of a human life in Iran? Let me guess…

Knowledge is a wonderful power if used judiciously and with fairness towards all. Remember, it is for us, and for our children, and our children’s children. They will inherit this world after us, and we should not let this darkness prevail or even descend upon, the lives of those innocent of this maliciousness, or for those that will follow.

I say, Not on our watch.

Not if I can help it.

mchain

DigiNotar Damage Disclosure
https://blog.torproject.org/blog/diginotar-damage-disclosure
https://www.govcert.nl/english/service-provision/knowledge-and-publications/factsheets/factsheet-fraudulently-issued-security-certificate-discovered.html

For me that would be the worst possible security choice, as the Web Shield doesn’t monitor HTTPS traffic; so wouldn’t provide the same level of protection that it is very good at on HTTP traffic. Blocking malware at source, sniffing out exploits and hacked sites, this happens to lots of sites and just because you are using an HTTPS connection doesn’t stop that.

You only need to take a browse round the viruses and worms forum to see just how beneficial its protection is. Many people only find out their site has been hacked after avast users tell them or if they come to the forums to report what they consider a false positive only to find the detection is good.

Be careful what you wish for ;D

DavidR,

There is much I do not know. This fact re WebShield was unknown to me. Perhaps, when seen in the light of what you say, then, it is best to leave things as they are; but we also need to maintain and keep our awareness of exploits designed to hurt and cripple those who mean no harm to others.

Among all the other activities we do, this one, use of the Internet, is in but a smaller realm, but has become essential to, and is in part of, our structure of our modern world. If we lose control of that, then our future may be not as easily foreseeable as it may be now.

Few may agree with my assessment; it is, however, meant in all sincerity.

Perhaps Avast! could monitor HTTPS traffic as well if need be. That, I think, was an implied point in what I was trying to say, although it was never specifically directed towards Avast!. I am sorry I did not make this clear; I was not aware of, and did not know of, some of the basic structures upon which the Internet is built upon. I did not know Avast! did not monitor HTTPS traffic, for example.

What I wish for is something better than we now have. I think the need is to find a way to prevent exploitative behavior in the first place. How to do this I cannot say.

If I wanted to learn how, and I do, I think here in this forum would be an excellent place to begin.

mchain

XP Home Edition SP3 2GB RAM Avast! 6.0.1203

The whole point of HTTPS (secure encrypted connection) is to keep prying eyes out, including your AV and this is no different from most other AVs, that is the ones that even have web content scanning.

The problem being the avast web shield redirects http traffic through its ‘localhost’ proxy; so it would have to handle the secure connection in a similar way to Mail Shield does to possibly do this. Right now that doesn’t/can’t happen, but it is I believe something they are working on for a future version of avast (no point in asking dates, etc. as this isn’t firm right now).

@mchain: If you want to discuss this further please open a new topic.
Thanks,
asyn


Some of the below has already been posted but there are some new items to be aware of in the slide show presentation.

10 Biggest Cyber Attacks In August

Anonymous hackers kicked off the month of August with a cyber attack against FBI contractor ManTech International, which they claimed compromised almost 400 megabytes of data from the managed cybersecurity provider and was part of its AntiSec campaign -- a collaborative effort between Anonymous and spin-off hacker group LulzSec.

Included in the stolen data were numerous documents belonging to NATO, the U.S. Army, the U.S Department of Homeland Security, the U.S. State Department and the U.S. Department of Justice, as well as other personnel information, the group said.

http://www.crn.com/slide-shows/security/231600608/10-biggest-cyber-attacks-in-august.htm;jsessionid=usMK7Z0OR4pmmNi6OATDcw**.ecappj02?cid=nl_sec



British Police Arrest Two More Anonymous Hacker Suspects

British police arrested two men Thursday allegedly affiliated with the global hacker collective Anonymous and spinoff group LulzSec.

British police arrested 20-year-old Christopher Weatherhead, from Northampton, and Ashley Rhodes, 26, from London, charging both individuals with computer crimes.

Also as part of the same crackdown, two other suspects – 22-year-old Peter Bigson, as well as a 17-year-old from Chester – have already been arrested and charged with computer crimes, which allegedly included cyber attacks against PayPal, Amazon (NSDQ:AMZN), MasterCard , Bank of America and Visa.

http://www.crn.com/news/security/231600764/british-police-arrest-two-more-anonymous-hacker-suspects.htm?cid=nl_sec


Microsoft Security Advisory (2607712)
Fraudulent Digital Certificates Could Allow Spoofing
http://www.microsoft.com/technet/security/advisory/2607712.mspx

Update available now through Windows update.

  • A restart is required for all editions of Windows XP and of Windows Server 2003.

  • A restart is not required for all editions of Windows Vista, of Windows 7, of Windows Server 2008, and of Windows Server 2008 R2. The installer stops the required services, applies the update, and then restarts the services. However, if the required services cannot be stopped for any reason, or if required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.


Man Gets 6-Year Jail Term For ‘Sextortion’

A California man was sentenced to six years in prison for hacking into dozens of computers, stealing personal information and demanding naked images from female victims in exchange for not releasing the stolen information.

http://www.wbaltv.com/r/29057215/detail.html


DigiNotar breach due to disastrous security
http://www.h-online.com/security/news/item/DigiNotar-breach-due-to-disastrous-security-Update-1337573.html
http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/rapporten/2011/09/05/diginotar-public-report-version-1/rapport-fox-it-operation-black-tulip-v1-0.pdf

Browser makers update their DigiNotar disaster updates
http://www.h-online.com/security/news/item/Browser-makers-update-their-DigiNotar-disaster-updates-1338144.html