Skip to main content

Is hbook.com a Scam? Security Check Results - The Horn Book, Inc. Reviews

T

Is hbook.com Safe? Security Analysis for The Horn Book, Inc.

Check if hbook.com is a scam or legitimate. Free security scan and reviews.

MediaUnited Statesmedium
jQueryBootstrap 3.3.7Google AnalyticsGoogle Tag ManagerGoogle reCAPTCHA+3 more
Analyzed 9/7/2025Completed 9:17:13 AM
60
Security Score
MEDIUM RISK

AI Summary

The Horn Book, Inc. operates a well-established digital and print publishing platform focused on children's and young adult literature. Founded in 1924, it holds a strong market position as a leading journal and review source in its niche. The website reflects a mature business model with subscription services, digital editions, and a variety of content including articles, reviews, and special projects. Technically, the site uses a modern but somewhat dated tech stack with Bootstrap 3 and jQuery, integrated with Google Analytics, HubSpot, and other marketing tools. The site is mobile optimized and provides a good user experience with clear navigation and professional design. Security posture is solid with HTTPS and reCAPTCHA usage, but lacks some advanced security headers and explicit incident response policies. WHOIS data is missing, which slightly reduces trust but does not contradict the business legitimacy. Overall, the site is professional, content-rich, and trustworthy with room for security and compliance improvements.

Detected Technologies

jQueryBootstrap 3.3.7Google AnalyticsGoogle Tag ManagerGoogle reCAPTCHAHubSpot scriptsActOn marketing scriptsGoogle Maps API

đź§ AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

The Horn Book targets educators, librarians, parents, and children’s literature professionals, leveraging subscription revenue and partnerships with related media entities. Its affiliation with Media Source Incorporated and partnerships with emagazines.com and other industry players strengthen its ecosystem. The company benefits from a long history and strong brand recognition. The business model focuses on content subscription and digital access, supported by marketing automation and analytics. Growth potential lies in expanding digital offerings and enhancing user engagement. The website's integration with multiple marketing and analytics platforms indicates a data-driven approach to customer acquisition and retention.

Extracted Contact Information

Marketing Intelligence Data

Email Addresses (4)

c*****@slj.com
c*****@libraryjournal.com
c*****@hbook.com
a*****@quantilus.com

Phone Numbers (1)

888*******

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a moderate to good security maturity level with enforced HTTPS, use of Google reCAPTCHA for form protection, and cookie consent mechanisms. However, the absence of key security headers such as Content-Security-Policy and lack of published incident response or vulnerability disclosure policies indicate gaps in security governance. No vulnerabilities or exposed sensitive data were detected in the content. The site enforces login session limits, which is a positive control. Overall, the security posture is adequate but could be improved by adopting best practices in security headers, transparency, and incident management.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement and enforce security headers including Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options to mitigate common web attacks.

✨Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

The Horn Book, Inc.

Description:

The Horn Book Magazine and The Horn Book Guide are distinguished journals in children’s and young adult literature, founded in 1924 by Bertha Mahony. The company focuses on publishing and reviewing children's literature.

Key Services:
Publishing The Horn Book MagazineProviding book reviewsHosting special projects and awards (e.g., Boston Globe–Horn Book Awards)Offering subscription services
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
jQueryBootstrap 3.3.7Google AnalyticsGoogle Tag ManagerGoogle reCAPTCHAHubSpot scriptsActOn marketing scriptsGoogle Maps API
Frameworks:
Bootstrap
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
80/100
Best Practices:
  • HTTPS enforced (implied by canonical URL and Google Tag Manager usage)
  • Use of Google reCAPTCHA for forms
  • Cookie consent mechanism implemented
  • Login session management with device limits

Analytics & Tracking

Services:
Google AnalyticsHubSpot Analytics
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Ad Networks:
Google Ad Manager
Tracking Pixels:
ActOn BeaconHubSpot Analytics
Marketing Tools:
HubSpotActOn
Transparency Level:good

Website Quality Assessment

Design Quality:good
User Experience:good
Content Relevance:excellent
Navigation Clarity:good
Professionalism:good
Trustworthiness:high

Key Observations

1

Website is fully accessible with rich content and no blocking detected.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

68/100
Score

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR

Privacy policy may not be GDPR compliant

MEDIUM

Privacy policy lacks explicit GDPR compliance elements

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: transport, digital

đź“§Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

70/100
Score

DMARC not enforcing

MEDIUM

DMARC policy is set to "none"

No DMARC reporting

LOW

DMARC aggregate reports not configured

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:spf.protection.outlook.com include:20468848.spf08.hubspotemail.net -all
DNS Lookups:2/10
Policy:-all
DKIM Selectors Found
Selector:selector1(1296-bit rsa)
Selector:selector2(1416-bit rsa)
DMARC Details
Policy:none

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

67/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

Mixed Content Detected

MEDIUM

7 resources loaded over insecure HTTP

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

80/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

DMARC Policy Set to None

LOW

DMARC is configured but not enforcing any policy

DNS Records

A Records:18.235.124.207, 34.197.141.184
Name Servers:
ns-1007.awsdns-61.netDNS only
ns-1427.awsdns-50.orgDNS only
ns-1912.awsdns-47.co.ukDNS only
ns-31.awsdns-03.comDNS only
MX Records:
0: hbook-com.mail.protection.outlook.com
SOA:Serial: 1, TTL: 86400s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:102ms

SPF Analysis

SPF Record:
v=spf1 include:spf.protection.outlook.com include:20468848.spf08.hubspotemail.net -all

⚡Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

đź”§Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website uses a stable but somewhat dated technology stack with Bootstrap 3 and jQuery 3.3.1, integrated with Google Analytics, Google Tag Manager, HubSpot, and ActOn marketing automation. The site is mobile responsive and includes search functionality and subscription management features. Performance is moderate, with some reliance on third-party scripts which may impact load times. The absence of a detected CMS suggests a custom or proprietary platform. The site could benefit from modernization efforts including upgrading Bootstrap and jQuery versions, optimizing script loading, and improving accessibility features.
Analyze Another Website