By now, most of us have heard of the latest Google Chrome bug.
The malicious code appeared in Chrome’s browser’s address bar, and after clicking the link, the victim clicked on a link that redirects the user to another page.
This was a fairly recent bug, and many websites and services had already patched it before it became widespread.
But when we asked some of the top Web hosting companies in the world, most would not be able to tell us if they had fixed it.
When we asked, some of them declined to answer our questions, and they did not respond to our questions either.
“It’s frustrating to have to ask those questions,” says Scott Wilson, VP of product management for HostGator.
“If a website is not on our list, it’s not going to be a problem for us.”
“If it’s been a month, it probably is.”
HostGators VP of customer experience and technology Scott Wilson says it’s very frustrating to be asked if a site has patched the vulnerability, and he feels the need to make a point that a large majority of the companies he spoke to are working to address the issue.
“We’re still seeing these exploits, so the fact that we haven’t fixed them yet, it doesn’t surprise us at all,” he says.
Wilson also noted that it’s difficult for a host to know if a particular website has fixed the issue and is safe to use, since some websites may have patched it or might not have.
“A lot of times, a site may not have patched the issue because it was not working properly, and it was causing crashes,” Wilson says.
“There’s a lot of things you can do to try and mitigate the risk of these things happening.”
It’s also important to note that the majority of sites in HostGatest’s list of supported hosts are hosted in Europe, and that there is no guarantee that a host will be able or willing to patch an exploit, even if it has been fixed.
If a site you’re using is not listed, you can always contact your hosting provider directly to see if they have patched this vulnerability, but if they do not, it could be that the host is not taking the issue seriously enough to fix it.
For example, in a recent study, it was found that most websites did not have an adequate support team in place for Google Chrome and other vulnerable browsers, and the majority did not patch the issue before a vulnerability was made public.
Wilson feels it’s important to make this point.
“What we’ve seen time and time again is that the Web hosting industry has gotten this right,” he said.
“The fact that there are websites that are running, or have hosted, these exploits and not addressing it is a bit frustrating.”
He continued: “It really should be easy for people to run these sites, but it doesn