Other breaches include buffer-overflow attacks as well as tampering with CGI scripts and unencrypted cookies to gain unauthorized access and steal identities. In the latter, hackers take advantage of Web browsers or cookies that sometimes erroneously reveal customer account information because the applications don't check account-ID parameters.. . .
Other breaches include buffer-overflow attacks as well as tampering with CGI scripts and unencrypted cookies to gain unauthorized access and steal identities. In the latter, hackers take advantage of Web browsers or cookies that sometimes erroneously reveal customer account information because the applications don't check account-ID parameters.

"Companies have done a pretty good job installing firewalls and protecting networks," says Pete Lindstrom, director of security strategies at analyst firm Hurwitz Group. "The area with the greatest vulnerability now is in the applications themselves. It's proving to be an easier target."

Data from SecurityFocus, a San Mateo, Calif., company that provides vulnerability alerts and security advice, supports what Lindstrom says. SecurityFocus, which collects data from 9,000 sites in more than 140 countries, has found most hackers target ports in the firewall that are passageways to applications. Of the more than 10 million security incidents SecurityFocus tracked the first week of February, 64% targeted port 80, which is the application port. About 9% targeted port 139, used for Windows networking and file sharing, and 6% targeted FTP on port 21.

The link for this article located at Information Week is no longer available.