PDF Document Download
Securing Web 2.0: Are your web applications vulnerable?
You must be a logged in to view this document.
When Web 2.0 applications push functionality and code to users, they provide hackers with information that can be used for formulating attacks. Often, old attacks such as cross-site scripting become more dangerous when used against Web 2.0 applications. This white paper defines some of the common technological components of Web 2.0 applications and discusses ways of securing them against exploitation.
Until security is part of the complete software development lifecycle, Web 2.0 applications will remain insecure and can increase the potential for harm.