News

Web 2.0 Threats Loom Large for IT

With the seemingly exponential growth of Web 2.0 technologies, IT professionals in education -- and all other sectors, for that matter -- face new challenges as control over technology slips away and moves into the hands of users. The very technologies that make Web 2.0 a reality (AJAX, in large part) seem to be considerably vulnerable to security breaches that can lead to data loss, theft and other malicious activities. And the growth of converged devices taking advantage of these technologies adds further to the problems.

Last week, security firm Websense released a report that showed for the first time in history that Web sites compromised by "attackers" (phishers, etc.) now exceed those created specifically by attackers. In other words, more previously legitimate sites have been turned to malicious purposes than sites created for malicious purposes in the first place.

And the tool of choice in this new development? The Web 2.0 technologies used on those legitimate sites, which offer vulnerabilities attackers can take advantage of.

According to the Websense Security Labs report, which looked at security trends in the latter half of 2007, Web 2.0- and event-based attacks are on the rise, including spoofing search engine results to "drive traffic to infected sites."

Said Dan Hubbard, vice president of research for Websense, "We believe that attackers will continue to be creative and leverage Web 2.0 applications and user-generated content to create even bigger security concerns for organizations. With this in mind, organizations need to ensure their Web, messaging and data security solutions can protect the avenues hackers seek to exploit for financial gain."

But Websense is only the most recent organization raising red flags on the vulnerabilities of Web 2.0 technologies.

In higher ed, Georgia Tech's Information Security Center released a report entitled "GTISC Emerging Cyber Threats Report for 2008" (PDF) in which Web 2.0 was cited first as one of the threats to watch in 2008, topping botnets, directed messaging attacks and RFID attacks. (It also cited related mobile convergence threats -- devices built to take advantage of Web 2.0 technologies -- in its top 5.)

Commenting on the report, GTISC Director Mustaque Ahamad said, "As newer and more powerful applications enabled by technologies like Web 2.0 continue to grow, and converged communications applications increasingly rely on IP-based platforms, new challenges will arise in safeguarding these applications and the services they rely on. The GTISC Emerging Cyber Threats Report for 2008 highlights those areas of greatest risk and concern, particularly as continued convergence of enterprise and consumer technologies is expected over the coming year."

In that report, Web 2.0 was cited for potential client-side attacks on social networking technologies, aimed at "stealing private data, hijacking Web transactions, executing phishing scams, and perpetrating corporate espionage." Mobile convergence threats included "vishing," "smishing" and voice spam, plus denial of service attacks targeting voice infrastructure, according to the report.

Earlier this month, the KPMG, a UK-based consultancy, released a report entitled "Risk concerns stall uptake of Web 2.0 technology in the workplace." The report focused on the adoption of Web 2.0 technologies in the business sector, citing slow adoption owing to security concerns. Of 472 executives from around the world surveyed for the report, more than half said that security is a principal barrier to adoption.

Said Crispin O'Brien, chairman of technology for KPMG, "Web 2.0 is not just about novel consumer technology, there are real business benefits to be derived from enabling more effective knowledge sharing and collaboration among employees. The challenge for the technology industry is to communicate these benefits to customers effectively and address the concerns that remain around security and relevance to different industries."

Furthermore, just last week, the SANS Institute came out with its own report -- "Top Ten Cyber Security Menaces for 2008" -- naming Web application exploits, including Web 2.0, at No. 8.

Said the report:

Large percentages of Web sites have cross site scripting, SQL injection, and other vulnerabilities resulting from programming errors. Until 2007, few criminals attacked these vulnerable sites because other attack vectors were more likely to lead to an advantage in unauthorized economic or information access. Increasingly, however, advances in XSS and other attacks have demonstrated that criminals looking for financial gain can exploit vulnerabilities resulting from Web programming errors as new ways of penetrating important organizations. Web 2.0 applications are vulnerable because user-supplied data cannot be trusted; your script running in the users' browser still constitutes "user supplied data." In 2008, Web 2.0 vulnerabilities will be added to more traditional programming flaws and Web application attacks will grow substantially.

And related technologies didn't get off the hook either. Exploits against converged devices, such as smart phones and iPhones, were named the No. 4 threat. And Web-based digital media technologies were actually listed as the No. 1 threat category for the ways in which they create vulnerabilities within Web browsers.

About the Author

Dave Nagel is the executive editor for 1105 Media's educational technology online publications and electronic newsletters.

comments powered by Disqus

Featured

  • Compare New GitHub Copilot Free Plan for Visual Studio/VS Code to Paid Plans

    The free plan restricts the number of completions, chat requests and access to AI models, being suitable for occasional users and small projects.

  • Diving Deep into .NET MAUI

    Ever since someone figured out that fiddling bits results in source code, developers have sought one codebase for all types of apps on all platforms, with Microsoft's latest attempt to further that effort being .NET MAUI.

  • Copilot AI Boosts Abound in New VS Code v1.96

    Microsoft improved on its new "Copilot Edit" functionality in the latest release of Visual Studio Code, v1.96, its open-source based code editor that has become the most popular in the world according to many surveys.

  • AdaBoost Regression Using C#

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the AdaBoost.R2 algorithm for regression problems (where the goal is to predict a single numeric value). The implementation follows the original source research paper closely, so you can use it as a guide for customization for specific scenarios.

  • Versioning and Documenting ASP.NET Core Services

    Building an API with ASP.NET Core is only half the job. If your API is going to live more than one release cycle, you're going to need to version it. If you have other people building clients for it, you're going to need to document it.

Subscribe on YouTube