The Unseen Consequence of Web 2.0 and Rapid Development: Hacking

The Web 2.0 movement has revolutionized and continues to revolutionize how we use the internet. It has made social connection and user interaction the driving force behind how websites and social networks develop. We’ve been enjoying this new world of the web for quite a few years. But new technologies like HTML5 and the various functionalities of Web 2.0 have also created an unforeseen consequence: hacking.

A recent article on Biztech2 discusses this in detail, but we’ll dissect it and give you the most important parts. The problem is in web applications. “Web applications remain the third most common attack vector overall.” This is unfortunate, as web applications are a primary driver behind shaping the “2.0” in Web 2.0.

As the web becomes more linked together with social networking and simple link-sharing, things can get more dangerous. Why? Because “Hackers frequently attack the trusted partners of their real victims.” With all of the interconnected aspects of a modern website, they can find ways to get to their real victims by doing this.

What most of this comes down to is the fact that “no modern application can be made 100% secure.” It’s a simple fact of the matter that hackers have the ball in their court. Developers and security companies can only react to recent moves by hackers, especially if the hackers have discovered an unknown vulnerability.

One takeaway you can get from this news? If you have am organizational or corporate website—or any site for that matter—you might want to consider promoting a Web Application Firewall for your visitors as well as getting one for yourself. These can help mitigate the danger of a security breach from that “third most common attack vector.”

If you want to read more about web application firewalls, head to the wiki here. The whole aspect of security has been something not focused on a great deal by proponents of Web 2.0. There needs to be a much greater emphasis and education on security for web users and web creators. Hacking isn’t going to go away, so it’s best to tackle the problem head-on!

Leave a Reply

Your email address will not be published. Required fields are marked *


+ 8 = fourteen

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>