Will Malware 2.0 replace Web 2.0 in 2009?
The new breed of web infection is making regular browsing a particularly hazardous experience.

The next generation web has created a new wave of infection which you can catch simply by visiting a web page, according to an EU report.
EU agency ENISA explained that the risks of Web 2.0 - with its use of photo sharing, wikis, social bookmarking and social networking - was creating a new breed of web-borne infection.
Web 2.0 application vulnerabilities such as cross-site scripting had been an important contributor for the rise of so-called "Malware 2.0".
Infection with malware was also being increasingly via drive-by vectors, where machines could be infected by visiting a web page, without the user doing anything else.
One of the big problems was that web applications had to become increasingly sophisticated to keep up with demand for services, but this was creating big security holes.
"Web 2.0 applications are pushing existing web technologies to their limits - as a result, even the best developers have had to resort to hacks' and loopholes in the system to make their applications work," said ENISA expert Giles Hogben.
"It's no surprise that criminals are attacking these applications, and are using them as vehicles to distribute malicious code to users."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It was added that there was now flourishing black market in malware installations, where it was becoming organised and lucrative enough to offer package deals with standard prices per installation'.
It was a form of malware as a service', which IT PRO has seen on the rise in 2008, together with how easy it's become to be an online criminal.
Another major problem was that it was becoming more difficult for users to recognise whether information could be trusted without knowing where it originally came from.
A related survey using a YouGov panel revealed that most people would trust a source as long as it appeared more than once on the web, but the tendency of blogs and wikis to replicate rumours makes this a bad strategy.
The full report is available here, with survey results here.
Click here for more on ENISA's work protecting Europe from cyber attack.
-
Blackouts in Spain and Portugal could be a cyber attack
Both countries are "paralyzed" by nationwide power outages
By Jane McCallion
-
Cisco takes aim at AI security at RSAC with ServiceNow partnership
News The companies claim Cisco AI Defense and ServiceNow SecOps will help address new challenges raised by AI
By Jane McCallion
-
Forcing Apple to allow alternative app stores might cause major security risks
Analysis Apple will be forced to allow third-party marketplaces on its devices, but some experts have raised serious security concerns
By Solomon Klappholz
-
Why bolstering your security capabilities is critical ahead of NIS2
NIS2 regulations will bolster cyber resilience in key industries as well as improving multi-agency responses to data breaches
By ITPro
-
New EU vulnerability disclosure rules deemed an "unnecessary risk"
News The vulnerability disclosure rules in the Cyber Resilience Act could also cause a “chilling effect” on security researchers
By Ross Kelly
-
Are you ready for NIS2?
WEBINAR Find out what you should be doing to prepare for the EU’s latest data protection regulation and UK equivalent with our free webinar
By ITPro
-
EU regulators are digging their heels in despite big tech’s Data Act pushback
Analysis EU regulators are no strangers to big tech regulatory push back, so why do companies still persist?
By Ross Kelly
-
Microsoft's EU Data Boundary will begin staggered rollout in January 2023
News Public sector and commercial customers will be the first to benefit when the rollout begins on 1 January across all of Microsoft's core services
By Ross Kelly
-
EU watchdog fights against rules permitting Europol's ‘unlawful’ data practices
News The pushback follows allegations that Europol was allowed to write its own rules when it came to handling sensitive data
By Connor Jones
-
EU to introduce strict IoT security regulation
News Manufacturers will be required to assess all risks, and notify the EU of issues within 24hrs
By Rory Bathgate