News

Web 2.0 Threats Loom Large for IT

With the seemingly exponential growth of Web 2.0 technologies, IT professionals in education -- and all other sectors, for that matter -- face new challenges as control over technology slips away and moves into the hands of users. The very technologies that make Web 2.0 a reality (AJAX, in large part) seem to be considerably vulnerable to security breaches that can lead to data loss, theft and other malicious activities. And the growth of converged devices taking advantage of these technologies adds further to the problems.

Last week, security firm Websense released a report that showed for the first time in history that Web sites compromised by "attackers" (phishers, etc.) now exceed those created specifically by attackers. In other words, more previously legitimate sites have been turned to malicious purposes than sites created for malicious purposes in the first place.

And the tool of choice in this new development? The Web 2.0 technologies used on those legitimate sites, which offer vulnerabilities attackers can take advantage of.

According to the Websense Security Labs report, which looked at security trends in the latter half of 2007, Web 2.0- and event-based attacks are on the rise, including spoofing search engine results to "drive traffic to infected sites."

Said Dan Hubbard, vice president of research for Websense, "We believe that attackers will continue to be creative and leverage Web 2.0 applications and user-generated content to create even bigger security concerns for organizations. With this in mind, organizations need to ensure their Web, messaging and data security solutions can protect the avenues hackers seek to exploit for financial gain."

But Websense is only the most recent organization raising red flags on the vulnerabilities of Web 2.0 technologies.

In higher ed, Georgia Tech's Information Security Center released a report entitled "GTISC Emerging Cyber Threats Report for 2008" (PDF) in which Web 2.0 was cited first as one of the threats to watch in 2008, topping botnets, directed messaging attacks and RFID attacks. (It also cited related mobile convergence threats -- devices built to take advantage of Web 2.0 technologies -- in its top 5.)

Commenting on the report, GTISC Director Mustaque Ahamad said, "As newer and more powerful applications enabled by technologies like Web 2.0 continue to grow, and converged communications applications increasingly rely on IP-based platforms, new challenges will arise in safeguarding these applications and the services they rely on. The GTISC Emerging Cyber Threats Report for 2008 highlights those areas of greatest risk and concern, particularly as continued convergence of enterprise and consumer technologies is expected over the coming year."

In that report, Web 2.0 was cited for potential client-side attacks on social networking technologies, aimed at "stealing private data, hijacking Web transactions, executing phishing scams, and perpetrating corporate espionage." Mobile convergence threats included "vishing," "smishing" and voice spam, plus denial of service attacks targeting voice infrastructure, according to the report.

Earlier this month, the KPMG, a UK-based consultancy, released a report entitled "Risk concerns stall uptake of Web 2.0 technology in the workplace." The report focused on the adoption of Web 2.0 technologies in the business sector, citing slow adoption owing to security concerns. Of 472 executives from around the world surveyed for the report, more than half said that security is a principal barrier to adoption.

Said Crispin O'Brien, chairman of technology for KPMG, "Web 2.0 is not just about novel consumer technology, there are real business benefits to be derived from enabling more effective knowledge sharing and collaboration among employees. The challenge for the technology industry is to communicate these benefits to customers effectively and address the concerns that remain around security and relevance to different industries."

Furthermore, just last week, the SANS Institute came out with its own report -- "Top Ten Cyber Security Menaces for 2008" -- naming Web application exploits, including Web 2.0, at No. 8.

Said the report:

Large percentages of Web sites have cross site scripting, SQL injection, and other vulnerabilities resulting from programming errors. Until 2007, few criminals attacked these vulnerable sites because other attack vectors were more likely to lead to an advantage in unauthorized economic or information access. Increasingly, however, advances in XSS and other attacks have demonstrated that criminals looking for financial gain can exploit vulnerabilities resulting from Web programming errors as new ways of penetrating important organizations. Web 2.0 applications are vulnerable because user-supplied data cannot be trusted; your script running in the users' browser still constitutes "user supplied data." In 2008, Web 2.0 vulnerabilities will be added to more traditional programming flaws and Web application attacks will grow substantially.

And related technologies didn't get off the hook either. Exploits against converged devices, such as smart phones and iPhones, were named the No. 4 threat. And Web-based digital media technologies were actually listed as the No. 1 threat category for the ways in which they create vulnerabilities within Web browsers.

About the Author

Dave Nagel is the executive editor for 1105 Media's educational technology online publications and electronic newsletters.

comments powered by Disqus

Featured

  • Windows Community Toolkit v8.2 Adds Native AOT Support

    Microsoft shipped Windows Community Toolkit v8.2, an incremental update to the open-source collection of helper functions and other resources designed to simplify the development of Windows applications. The main new feature is support for native ahead-of-time (AOT) compilation.

  • New 'Visual Studio Hub' 1-Stop-Shop for GitHub Copilot Resources, More

    Unsurprisingly, GitHub Copilot resources are front-and-center in Microsoft's new Visual Studio Hub, a one-stop-shop for all things concerning your favorite IDE.

  • Mastering Blazor Authentication and Authorization

    At the Visual Studio Live! @ Microsoft HQ developer conference set for August, Rockford Lhotka will explain the ins and outs of authentication across Blazor Server, WebAssembly, and .NET MAUI Hybrid apps, and show how to use identity and claims to customize application behavior through fine-grained authorization.

  • Linear Support Vector Regression from Scratch Using C# with Evolutionary Training

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the linear support vector regression (linear SVR) technique, where the goal is to predict a single numeric value. A linear SVR model uses an unusual error/loss function and cannot be trained using standard simple techniques, and so evolutionary optimization training is used.

  • Low-Code Report Says AI Will Enhance, Not Replace DIY Dev Tools

    Along with replacing software developers and possibly killing humanity, advanced AI is seen by many as a death knell for the do-it-yourself, low-code/no-code tooling industry, but a new report belies that notion.

Subscribe on YouTube