Wall Street & Technology is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk Management

02:03 PM
Connect Directly
Facebook
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Web 2.0: A New Port of Entry for Hackers?

If your company has leapt onto the Web 2.0 bandwagon - embracing applications like blogs, wikis and podcasts that foster increased collaboration and communication - it could be exposing its corporate networks to new attacks from hackers.

If your company has leapt onto the Web 2.0 bandwagon - embracing applications like blogs, wikis and podcasts that foster increased collaboration and communication - it could be exposing its corporate networks to new attacks from hackers.Web 2.0 applications enable anyone to have access to your source code and will expose you to attacks without you knowing it is happening, says Ryan Berg, co-founder and chief scientist for Ounce Labs , a provider of source code vulnerability analysis solutions.

"With Web 2.0, attackers have much more inside knowledge of how your applications work. You have to recognize that the minute you put your code in the browser, you no longer own it. Anyone can modify the browser code. So you must never trust the client," Berg says. "And make sure your business-sensitive information is not exposed."

Berg adds that nowadays Web browsers are being used as the attack platform of choice. In the pre-Web 2.0 days, you used to get a malicious alert box popping up on your screen which you could then simply avoid clicking on.

But the old adage of not clicking on any links you don't trust no longer holds true. Nowadays, just visiting a Web site is sufficient: as soon as you visit what seems to be an innocuous Web site, code could start running on your machine in the background, ready to steal any sensitive information you have on your computer.

Berg says one of the best ways of protecting yourself when surfing the Web is to disable JavaScript, the scripting language most often used for web development, which enables any site to potentially run code in the context of your browser.

Internet Explorer is also a potential minefield: its use of Active X controls that give full access to the Windows operating system can expose you to malicious Active X threats in a way that other browsers such as Mozilla Firefox, will not.

Berg also urges Web users to remember to always log out of web applications. Online banking has become more risky. Clients used to have to download special applications from their bank in order to do online banking, but that is no longer necessary and clients who log onto their bank account from a regular Web browser application often forget to log out of the page, which leaves them open to attacks.

More generally, the ever-present Google bar in browsers allows users to do searches without having to close any open windows.

"It's very easy for people to browse with all their windows open and this way the user loses the notion of what they are being authenticated into. It leaves you open to a bunch of attacks," says Berg. Melanie Rodier has worked as a print and broadcast journalist for over 10 years, covering business and finance, general news, and film trade news. Prior to joining Wall Street & Technology in April 2007, Melanie lived in Paris, where she worked for the International Herald ... View Full Bio

Register for Wall Street & Technology Newsletters
Video
Inside Abel Noser's Trading Floor
Inside Abel Noser's Trading Floor
Advanced Trading takes you on an exclusive tour of Abel Noser's New York trading floor, where the agency broker known for transaction cost analysis, is customizing algorithms for the buy side, while growing its fixed income trading and transitions business.