Web Hacking Facts and Figures

More than 280 million records were compromised in 2008
*According to a new Data Breach Investigations Report from global comms and IT provider Verizon Business.


Got questions about dotDefender? Please visit our knowledgebase for answers or contact Support at support@applicure.com.

Featured Blog Posts

The Small Webmaster's Guide to a Hacked Website

As the owner of a small web site, having your site fall victim to an ... read more ...

OWASP Top 10 2010

The September 2009 SANS Institute Top Cyber Security Risks report revealed that over 60% of ... read more ...

The Most Vulnerable Programming Languages

Normally, studies of Web application security involves which type of vulnerability is most common or ... read more ...

Reproduced from an article published by SC Magazine

Figures from the latest Web Hacking Incidents Database Annual Report

Web2.0 security is not about XSS, or SQL Injection or even any kind of injection attack. These are simply vulnerabilities. Web 2.0 security is all about the loose inter-communication between components which you can trust and components that you cannot, including use of 3rd party scripts such as those at 1000websitetools.com.

80% of IT practitioners report that their organization experienced 1 or more data breach

The causes of data breaches:

40% of Web hacking incidents are aimed at stealing personal information, with 67% of all attacks are profit motivated, according to the Web Hacking incidents Database project report for 2007.

Gartner has stated that 75% of all attacks on web sites and web applications target the application level and not the infrastructure.

NTA Monitor's 2008 Annual Security Report has revealed that the average number of vulnerabilities found per test have increased to 21 compared with 19 in 2007.

All of the top 10 high risk flaws are associated with services that are being made available to Internet users, demonstrating that with increased functionality comes the threat of reduced security.

Related Articles:

Securing Cloud Data
The Anatomy of a SQL Injection Attack
110,000 Credit Card Numbers Stolen in Tour Company Web Server Hack

Please Wait...