Talk:Malware
This is the talk page for discussing improvements to the Malware article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 3 months ![]() |
![]() | Malware was nominated as a Engineering and technology good article, but it did not meet the good article criteria at the time (March 22, 2013). There are suggestions below for improving the article. If you can improve it, please do; it may then be renominated. |
![]() | Malware received a peer review by Wikipedia editors, which is now archived. It may contain ideas you can use to improve this article. |
![]() | This ![]() It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
![]() | This article has been mentioned by a media organization:
|
Internet of Things (IOT) / user understanding / " Hazardware": notable?
[edit]In this revision, @Aegean Blue Sea: added this unsourced description of "Hazardware", considerably copy-edited by me:
- Prof Sean S. Costigan and Dr Dinos A. Kerigan-Kyrou (of the Partnership for Peace Consortium and the Marshall Center) have proposed the concept of "Hazardware". This refers to apps and IoT devices given authorization by a user who does not understand the scope or consequences. For example, a messaging app on a phone is likely to require permission to access the user's microphone and camera. The user may assume that the app will only access the microphone or camera when they make a voice or video call or take a photo. However, their permission allows the app to access the camera and microphone at any time. The security implications of Hazardware are substantial for military and business organisations and particularly the user of the app or device.
@Bruce1ee: reverted this with Twinkle saying please provide a source, which I thought might be a little abrupt and discouraging: on the one hand this article does seem to attract low-quality and dubious additions, but on the other, the topics of IoT and user understanding seem relevant but are barely touched on here. I found the probable source of this contribution at the sometimes criticised site academia.edu.[1] As I write the authors are unknown to Wikipedia. Dinos A. Kerigan-Kyrou I could not read the publication¿s? without registering, which I was reluctant to do, given Academia.edu § Criticism and the conflicting ratings by Web of Trust users, but I imagine it is probably bona fide. The term "hazardware" was not found by the authors' organisations' sites' search functions,[2], so the connection seems uncertain. Searching the internet for "hazardware", I only found the above revision of this article, the above paper¿s? and other meanings such as a dodgy assembly of components[3].
Can we not nonetheless make use of the above ideas?
PJTraill (talk) 10:42, 28 November 2018 (UTC)
References
- ^ (Please note criticisms of site) Possible duplicates – the only difference appears to be the number and the presence of ". By"
- ^ https://www.pfp-consortium.org/index.php/component/k2/itemlist/search?searchword=hazardware for the Partnership for Peace Consortium and http://www.marshallcenter.org/mcpublicweb/en/ for the Marshall Center
- ^ https://www.urbandictionary.com/define.php?term=Hazardware
- Certainly we can make use of the above ideas, provided they can be backup up with reliable sources. I also did a quick search for "hazardware" and not much that could be considered reliable came up. You're right, I may have been "a little abrupt and discouraging", but the edit come across as original research, and this article does tend to be a magnet for dubious additions. —Bruce1eetalk 13:28, 28 November 2018 (UTC)
- After my recent changes have just been reverted by User:Aegean Blue Sea I've popped a gentle warning on their talk page. -Snori (talk) 17:25, 6 December 2018 (UTC)
Website Vulnerability Scans
[edit]I read this section and edited out a preamble that I thought extraneous, but am reflecting that Website Vulnerability Scans are more to do with checking the site for coding errors that could leave the site vulnerable to crafted attacks. By and large malware attacks the computers that host websites rather than the site itself. Maybe that whole section is extraneous? I didn't feel quite confident to delete it.
@ 2603:800C:4BF0:D60:15B9:7804:5944:D1A (talk) 00:19, 28 January 2025 (UTC)
"Soutane (malware)" listed at Redirects for discussion
[edit]
The redirect Soutane (malware) has been listed at redirects for discussion to determine whether its use and function meets the redirect guidelines. Readers of this page are welcome to comment on this redirect at Wikipedia:Redirects for discussion/Log/2025 February 9 § Soutane (malware) until a consensus is reached. 1234qwer1234qwer4 02:41, 9 February 2025 (UTC)
"PE infection" listed at Redirects for discussion
[edit]
The redirect PE infection has been listed at redirects for discussion to determine whether its use and function meets the redirect guidelines. Readers of this page are welcome to comment on this redirect at Wikipedia:Redirects for discussion/Log/2025 February 9 § PE infection until a consensus is reached. 1234qwer1234qwer4 03:26, 9 February 2025 (UTC)
- Former good article nominees
- Old requests for peer review
- C-Class level-4 vital articles
- Wikipedia level-4 vital articles in Technology
- C-Class vital articles in Technology
- C-Class Computer security articles
- Top-importance Computer security articles
- C-Class Computer security articles of Top-importance
- C-Class Computing articles
- High-importance Computing articles
- All Computing articles
- All Computer security articles
- C-Class Crime-related articles
- High-importance Crime-related articles
- WikiProject Crime and Criminal Biography articles
- C-Class Computer science articles
- High-importance Computer science articles
- WikiProject Computer science articles
- C-Class software articles
- High-importance software articles
- C-Class software articles of High-importance
- All Software articles
- C-Class Internet articles
- High-importance Internet articles
- WikiProject Internet articles
- Wikipedia pages referenced by the press