
![]() |
PDF Document Download Document: Securing Web 2.0: Are your web applications vulnerable?You must be a logged in to view this document.
|
![]() Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology! |

Excerpt: When Web 2.0 applications push functionality and code to users, they provide hackers with information that can be used for formulating attacks. Often, old attacks such as cross-site scripting become more dangerous when used against Web 2.0 applications. This white paper defines some of the common technological components of Web 2.0 applications and discusses ways of securing them against exploitation. Until security is part of the complete software development lifecycle, Web 2.0 applications will remain insecure and can increase the potential for harm. |