When you combine threats like that with social networks, you have a problem.In fact, Facebook users were greeted by the New Year with a spyware widget known as "Secret Crush" or "My Admirer" that apparently tried to nail users with junk advertising and phone charges. The widget purportedly tried to install Zango software. The company Zango has denied having anything to do with this.
It's a safe bet to assume that throughout this year more attackers will find ways to exploit vulnerabilities in music and video files, mashups, widgets, and social sites in an attempt to stream malware right onto end user systems. This may even prove to be a faster vector of attack than e-mail. If an attacker can scheme a way to infect you, you'll unwittingly infect those who trust you, and they'll infect their friends. On it will go, and it may not take long to saturate the entire social/trust network. The same would be true for spreading fraudulent pyramid schemes or Nigerian 411-like scams.
This is about where we stand today with Web 2.0 attacks. And this is a problem for so-called Web 2.0 and social networking sites that will grow -- especially as these sites publish APIs and increasingly transform themselves from closed networks to Web development platforms.
I'd like to take a closer examination of Web 2.0 security concerns in future posts. And I'm curious to hear what enterprises are doing to mitigate the risk. Is the primary defense content filtering? Are companies banning access to sites like MySpace and Facebook, or even those aimed at corporate users such as LinkedIn from work systems?