zooniverse

Security




Zooniverse Security<p>The Zooniverse takes very seriously the security of our websites and systems, and protecting our users and their personal information is our highest priority. We take every precaution to ensure that the information you give us stays secure, but it is also important that you take steps to secure your own account, including:</p> <ul> <li>Do not use the same password on different websites. The password you use for your Zooniverse account should be unique to us.</li> <li>Never give your password to anyone. We will never ask you to send us your password, and you should never enter your Zooniverse password into any website other than ours. Always check your browser's address bar to make sure you have a secure connection to <em>www.zooniverse.org</em>.</li> </ul> <p>For general advice and information about staying safe online, please visit:</p> <ul> <li>Get Safe Online</li> <li>Stay Safe Online</li> <li>US-CERT - Tips</li> </ul> Reporting Security Issues <p>The Zooniverse supports responsible disclosure of vulnerabilities. If you believe you have discovered a security vulnerability in any Zooniverse software, we ask that this first be reported to security@zooniverse.org to allow time for vulnerabilities to be fixed before details are published.</p> Known Vulnerabilities and Incidents <p>We believe it is important to be completely transparent about security issues. A complete list of fixed vulnerabilities and past security incidents is given below:</p> <ul> <li> <p>November 9, 2020: Cross-Site Scripting Vulnerability in Zoomapper App</p> </li> <li> <p>April 3, 2020: Caesar Subject Rule Effect Vulnerability</p> </li> <li> <p>December 11, 2018: Cross-Site Scripting Vulnerability on Project Page's External Links</p> </li> <li> <p>June 21, 2018: Cross-Site Scripting on Project Home Pages</p> </li> </ul> <p>New vulnerabilities and incidents will be announced via the Zooniverse blog in the "technical" category.</p>





Comments:
No comments found