Web attack popular "cloud security" technology is more likely to be abused

Source: Internet
Author: User
Keywords Attacks cloud security these

Recently, the consolidated web, mail, and data security Solutions provider Websense released a security forecast for 2009. It is noteworthy that "cloud security" technology is abused, Web applications and Web 2.0 applications, and other malicious use of the risk will increase dramatically.

The report says services based on cloud computing technology, such as Amazon's Web services, Microsoft's Azure and Gogrid, provide businesses and users with an easy-to-use base operation, storage space on demand, and substantial cost savings. But these services have also aroused the high level of concern among cyber-criminals and hackers who will use these technologies and services to achieve their malicious aims. There will be more and more abuse of cloud computing technology in the 2009. The technology can be used both for simple spam messaging and for initiating malicious program attacks on downloads and legacy data.

Hackers will also make full use of web launch attacks. At present, the launch of the search engine Web API service is released at record-breaking speed, but there is little time for testing. Therefore, in the 2009, a malicious attack that uses Web API services to gain trust, steal a user's credentials, or confidential information will increase.

At the same time, as websites that allow users to edit content are becoming more popular and growing in number, these sites are likely to lead to a significant increase in web spam and malicious content sent to blogs, forums, and social sites, including search engine paralysis, malicious seduction and cyber fraud. In addition, these threats and attacks will be consolidated by a number of new Web attack tools, allowing hackers to discover vulnerabilities, or allow publishing
Malicious code Web site.

Other 2009 's more prominent security threats include: Hackers will switch to distributed botnet control and malicious code hosting, and attacks on "good reputation" sites will continue; Rich Internet application systems (such as Flash, Google gears, etc.) are more likely to be exploited maliciously.

Editor's comments: The threat to cloud security technology and Web applications is likely to be the security focus of the 2009. Security manufacturers should also reflect: facing the increasingly open platform and virus industry chain of perfection, we should put aside the speculation of various security concepts of the "pen", holding good information risk protection of the "gun"?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.