SHARE
Facebook X Pinterest WhatsApp

Whitehat Security Finds at Least One Vulnerability in 86 Percent of All Sites

May 3, 2013

The top two vulnerabilities identified by Whitehat during 2012 by prevalence were Information Leakage at 55 percent and Cross Site Scripting at 53 percent. Content Spoofing came in third at 33 percent, Cross Site Request Forgery in fourth at 26 percent tied with Brute Force.

Whitehat’s Brute Force vulnerability class is not quite the same as a classic Brute Force definition where an attacker tries repeatedly to get access with different username/password combinations. Typically many sites today use an email address as the username.

“When you log into a website you do it with a username/password and some of these sites will tell you which part you got wrong,” Jeremiah Grossman, founder of Whitehat explained. “So the bad guys will use the login with the password recovery systems to mine for valid email addresses on a given system to phish and spam you.”

From a remediation perspective, whatever the attack vector, Grossman said that accountability within an organization is critical.

“It is only when you have people that are accountable and empowered that you are able to affect real change in security and improve,” Grossman said.

Read the full story at eSecurity Planet:
Most Common IT Security Attack? Not SQL Injection

Sean Michael Kerner is a senior editor at InternetNews.com. Follow him on Twitter @TechJournalist.

Recommended for you...

Best Internet Security Software
Devin Partida
Mar 23, 2022
HP Wolf Security Report Shows Threat Landscape Getting Scarier
Rob Enderle
Oct 15, 2021
Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing
Rob Enderle
Sep 17, 2021
The Coming AI Threats We Aren’t Prepared For
Rob Enderle
Aug 27, 2021
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.