Web 2.0 Technologies Make 2010 Security Outlook Bleak

    As we look toward 2010, the one thing we can be sure of is that there will be a lot more collaboration between end users and different companies thanks to the mainstream adoption of a variety of Web 2.0 technologies. And with that increased adoption we’ll also see not only more sophisticated types of malware attacks in 2010, but more comprehensive ones as well.

    Bradley Anstis, vice president of technology strategy for M86 Security, a provider of security software that just acquired Finjan, notes that when it comes to security, IT organizations would do just as well to pay as much attention to the data leaving the company as they do the packets coming in. That’s because in the age of Web 2.0, more attacks have to do with pulling data out of the company than just trying to insert malware somewhere in the organization.

    In particular, Anstis says IT organizations will need to pay attention to the following security issues in 2010:

    • More Sophisticated Botnets: The first generation of botnets relied on rudimentary IRC-based command and control protocols that were relatively easy to spot. The latest generation is making use of mainstream HTTP protocols and the custom protocols used by services such as Twitter, Google and Facebook.
    • Attacks Focused on Social Network APIs: Beyond targeting the transports, security attacks are now starting to zero in on the APIs that social networks have made available to end users to integrate applications and mashup various sets of data.
    • Exploiting Rich Media Applications: Technologies such as Adobe Flash make it possible to create enticing applications that can easily be loaded with malware.
    • Increased Web Site Infections: The only thing hackers always like more than enticing users to a fake site is to infect their systems by hiding malware in legitimate sites, which are now hosting malware at an alarming rate.
    • Increased Targeting of Cloud Computing Services: Whether it’s just a software-as-a-service (SaaS) environment or a full cloud computing platform, large numbers of users will lead to larger number of attacks. The security of these platforms may be better than what any individual IT organization can do. But just crooks target banks that have better security than your home; hackers will go where the data is.

    Other things that Anspis says IT organizations need to keep an eye out for are poisoned search engine results that lead users to sites that have been optimized around a keyword in order to insert malware; more ‘scareware’ tactics that convinces users to download fake security software; exploitation of international domain names to create fake web sites; and more sharing of links to infected sites via link shortening service such as

    No matter how you cut it, 2010 is already shaping up to be a tough year for security. As such, Anstis, whose predictions can be found here, says the smartest thing any IT organization can do is a full review of their security policies to find out not only where money is being spent needlessly, but also to reduce complexity because just like Web 2.0 integration, complexity is the enemy of security.

    Mike Vizard
    Mike Vizard
    Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

    Get the Free Newsletter!

    Subscribe to Daily Tech Insider for top news, trends, and analysis.

    Latest Articles