The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors. Pull replaces push, polymorphism complicates defenses and 90% of attacks take place at the application layer, exploiting software-based or social vulnerabilities. This white paper discusses the changes in vulnerabilities with the advent of Web 2.0 and the countermeasures that can be taken to protect against the threats they bring.