August 7, 2007 (HOSTSEARCH.COM) With the increase in popularity of Web 2.0 applications (social-networking sites, wikis, blogs, etc.) that enable collaboration and sharing between users, there has been an increase in hacker activity targeted towards users and businesses using such applications. Recognizing this, web security and content protection solutions provider Websense (http://www.websense.com) has implemented an early warning system for Web 2.0 threats, it was revealed yesterday.
Websenses new offering finds security attacks launched within Web 2.0 applications and delivers threat protection to customers within minutes. Websense has deployed new "HoneyJax" systems across the Internet that emulate user behavior within Web 2.0 applications to uncover threats before they spread. According to the company, HoneyJax are the next evolution of honey-based systems designed to attract attackers and malicious code.
Developed within Websense Security Labs and now part of the Websense ThreatSeeker technology, Websense has been at the forefront of advanced threat detection technology. In addition to the new HoneyJax systems, ThreatSeeker technology uses Honeypots and Honeyclients to track down threats targeting operating systems and applications. Available from only Websense, ThreatSeeker technology provides threat intelligence to Websense Web Security Suite software. Websense Web Security Suite protects organizations from Web security threats within minutes, delivered automatically through Real-Time Security Updates.
If a hacker were to launch an attack using a social networking site, the ThreatSeeker technology would detect the threat through its HoneyJax systems. Websense Web Security Suite customers would then be automatically protected from accessing the compromised profiles within the site, as well as the site that is hosting the malicious code.
"Before businesses get a case of 'Web Two-Dot-Uh-Oh,' they should understand and evaluate security before deploying Web 2.0 applications," explained Websenses Vice President of Security Research, Mr. Dan Hubbard. "Using mash-ups, unattended code injection, and other tactics, Web 2.0 hackers provide yet another level of complexity for customers that want to prevent data loss and malicious attacks."