While people all over the planet enjoy interacting with Web applications, so too do the criminals of the world, apparently.
According to new research, Web applications remain the third most common target of attacks from hackers with the number of attacks increasing all the time. Contrary to the common Hollywood image of a shady, nefarious solo professional hacker wreaking havoc, Web applications are increasingly becoming the vector of choice for organized criminal groups, amateurs and political activists. Complex technology, growing adoption of web 2.0 functionality and powerful features of HTML5 have enhanced the opportunity for hackers to exploit vulnerabilities.
It means trouble for the world, particularly companies, government agencies, power grids and not-for-profit groups. The consequences of a compromised Web application can go way beyond the Web server: a number of high-profile attacks with prestigious companies have caused millions of dollars in losses.
Image via Shutterstock
Companies and other organizations should form long-term partnerships with reputable security companies providing individual solutions that will optimize Web application security, concludes analyst group Frost & Sullivan (News - Alert).
Frost & Sullivan recently issued a report that discusses the growing global threat to Web applications. The paper also gives an overview of the likely victims and outlines what some solutions are for organizations to protect themselves.
“According to High-Tech Bridge, as many as three out of four successful network intrusions start and/or involve an unsecured Web application,” said Frost & Sullivan analyst, Chris Rodriguez statement."By 'network intrusion' we mean attacks where the goal is to achieve an ongoing access.”
Rodriguez added that it's important to understand how hackers think when taking steps to prevent incursions.
"Hackers frequently attack the trusted partners of their real victims," adds Rodriguez. "Web developers usually consider partners to be trusted parties and take insufficient security measures. However, organizations must be vigilant that their partners ensure the protection of their accounts against breaches and misuse."
Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2012, taking place Oct. 2-5, in Austin, TX. Stay in touch with everything happening at ITEXPO (News - Alert). Follow us on Twitter.
Edited by Brooke Neuman