Although a man-in-the-middle attack could exploit the basic workings of AJAX, it's more likely attackers would plant mean-spirited functionality on a server and then direct the client to it, resulting in the unintentional download of malicious code.
Is AJAX a security risk? Probably. But let's not drag Web services through the mud just because AJAX is one of today's most commonly used SOA clients.
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
2018 State of the CloudCloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Cybersecurity Strategies for the Digital EraAt its core, digital business relies on strong security practices. In addition, leveraging security intelligence and integrating security with operations and developer teams can help organizations push the boundaries of innovation.