credit card information and customer lists. Hackers are concentrating their efforts on web-based applications –
shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure
web applications provide easy access to backend corporate databases and also allow hackers to perform illegal
activities using the compromised site.