Web Hacking Facts and Figures

More than 280 million records were compromised in 2008
*According to a new Data Breach Investigations Report from global comms and IT provider Verizon Business.



FAQs

Got questions about dotDefender? Please visit our knowledgebase for answers or contact Support at support@applicure.com.


Featured Blog Posts

CWE/SANS Top 25

With the release of the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors came a ... read more ...

Who is Minding Your Data in the Cloud?

In a recent post titled Data Security Considerations in the Cloud, problems related to who ... read more ...

Why Web Application Security?

Presence on the Internet involves dealing with an ever-shifting landscape. New technologies emerge while ... read more ...

Reproduced from an article published by SC Magazine

Figures from the latest Web Hacking Incidents Database Annual Report

Web2.0 security is not about XSS, or SQL Injection or even any kind of injection attack. These are simply vulnerabilities. Web 2.0 security is all about the loose inter-communication between components which you can trust and components that you cannot, including use of 3rd party scripts such as those at 1000websitetools.com.

80% of IT practitioners report that their organization experienced 1 or more data breach

The causes of data breaches:

40% of Web hacking incidents are aimed at stealing personal information, with 67% of all attacks are profit motivated, according to the Web Hacking incidents Database project report for 2007.

Gartner has stated that 75% of all attacks on web sites and web applications target the application level and not the infrastructure.

NTA Monitor's 2008 Annual Security Report has revealed that the average number of vulnerabilities found per test have increased to 21 compared with 19 in 2007.

All of the top 10 high risk flaws are associated with services that are being made available to Internet users, demonstrating that with increased functionality comes the threat of reduced security.


Related Articles:

Who is Minding Your Data in the Cloud?
OWASP Top 10 2010
The Anatomy of a SQL Injection Attack

Please Wait...