Does Web 2.0 need Security Web 2.0?
Editor's Note" Is that a rhetorical question or are they being sarcastic? No, let's keep typing. "Enter" at your own risk!
Web 2.0, the second wave of web development and design, is thriving, and so too are applications that take advantage of this technology.
Michael Shema, Qualys Inc Published: 5:00PM BST 03 Sep 2009
Interactive sites like LinkedIn, Twitter and even company websites are becoming ever more popular, and yet, many IT departments are unprepared for the associated new and emerging threats. As more and more companies take to the web to conduct business, the opportunity for attack is significantly increased and organisations need to re-adjust their security practices for the Web 2.0 world.
Traditionally, potential security breaches, or vulnerabilities, target personal and business information that is created and stored in certain Web 2.0 applications, such as Google Docs and Mobile Me.
Using sophisticated JavaScript programs developed specifically to capture data, hackers can redirect users to a perfect copy of the site they are expecting to see. (Web Site Cloning 101)
Continue Reading at Telegraph.co UK
Editor's Note" Is that a rhetorical question or are they being sarcastic? No, let's keep typing. "Enter" at your own risk!
Web 2.0, the second wave of web development and design, is thriving, and so too are applications that take advantage of this technology.
Michael Shema, Qualys Inc Published: 5:00PM BST 03 Sep 2009
Interactive sites like LinkedIn, Twitter and even company websites are becoming ever more popular, and yet, many IT departments are unprepared for the associated new and emerging threats. As more and more companies take to the web to conduct business, the opportunity for attack is significantly increased and organisations need to re-adjust their security practices for the Web 2.0 world.
Traditionally, potential security breaches, or vulnerabilities, target personal and business information that is created and stored in certain Web 2.0 applications, such as Google Docs and Mobile Me.
Using sophisticated JavaScript programs developed specifically to capture data, hackers can redirect users to a perfect copy of the site they are expecting to see. (Web Site Cloning 101)
Then, when log in details are entered (a.k.a. TYPED!) they are unknowingly... (Editor's Note: Unknowingly? Know this: When you TYPE/Enter log-in details, you are putting yourself in danger. Period. What's more to know? Read the signs) ...sent to the attacker, providing them with the information they need to access sensitive business information.
(a.k.a. access/wipe out your bank account, steal your credit/debit card numbers, etc. etc. etc. "Do Not Type...Do Not Enter!
Continue Reading at Telegraph.co UK
0 comments