Zajímavé srovnání, nové technologie nám toho umož?ují více, bohužel to platí i pro úto?níky:
Web 1.0
- Primitive phishing attacks
- Email-borne viruses
- Corporate data leakage via email
- Website defacements (”Hacktivism”)
Web 2.0
- Evolved phishing attacks; RIA’s and other techniques ”legitimize” phishing sites
- Email for social engineering, not malicious payload
- Corporate data leakage on blogs, social networking sites, etc.
- Website Infections (Malware inserted into XML tags for financial gain)
Viz také požadavky na bezpe?nost Webu 2.0 definované (Secure Computing) v ?lánku
Security requirements for a Web 2.0 world.