Web Hosting Security

  Home arrow Web Hosting Security arrow Security Vulnerabilities of Web Applic...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING SECURITY

Security Vulnerabilities of Web Applications
By: Barzan 'Tony' Antal
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 5
    2009-11-11

    Table of Contents:
  • Security Vulnerabilities of Web Applications
  • The Unfortunate Part
  • What Can We Do?
  • Dangers Lurking in Your Mailbox

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Security Vulnerabilities of Web Applications


    (Page 1 of 4 )

    We live a world where we're more frequently giving out our contact details like e-mail addresses, phone numbers, postal addresses, and even critical information such as our credit card numbers along with their expiration dates. We somehow think that prestigious companies do their best to secure their websites. While that may be true, the reality is that there are myriads of security vulnerabilities lurking everywhere.

    Sometimes it is mind-boggling how the plain and simple things become overlooked. Recently, three of the world's most popular and respected antivirus software development companies were proven wrong. An ethical ("white hat")hacker wiped the floor with their database security. As expected, the scenario made headlines and every paper ran the story.

    The hacker reported what he found to the companies and they fixed the vulnerability in less than half an hour; one of them actually took less than seven minutes. All right, so how could that still happen? One thing must be understood: as long as data is stored in computers, and these machines are interconnected, there is always a way in. But how was it possible that such companies could neglect such tiny security mistakes, huh?

    It should also be noted that the hacker had access to entire customer databases with entries including full names, e-mail addresses, credit/debit card information along with expiration dates, and even registration/activation keys. And not a few customers, mind you, but tens of thousands of them. No harm was done, but the fact that this kind of data could have gotten into the wrong hands is more than scary.

    You may consider this article to be an eye-opener. My purpose is not to rob you of sleep at night, but to explain that computer users tend to neglect their own security and like to consider themselves immune-that they will definitely not be victims of such activities. You can't be so sure! Anyone can become a victim...

    Therefore, the article you are reading right now is the first segment of a multi-part series covering security vulnerabilities. Our sole purpose is making you aware of the dangers lurking everywhere. We hope that we're going to help communities to realize that security can be compromised. Stick around and enjoy the ride-but pay attention!

    More Web Hosting Security Articles
    More By Barzan 'Tony' Antal

    WEB HOSTING SECURITY ARTICLES

    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates

     




    © 2003-2014 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap