News

SQL Injection Attack: What is it, and how to prevent it. The way that Yahoo! was hacked, SQL Injection attack, is the same method as many other hacks in the news recently: SQL Injection.
Application security SaaS company Indusface has detailed the potential financial impact of SQL Injection attacks on businesses.
Many of the attacks–which have compromised millions of legitimate sites, by some estimates–rely on simple, well-known techniques such as SQL injection to own a given site.
SQL injection attacks have been going on for years, and the vulnerabilities and exploitation techniques are well-understood and widely discussed. However, they’re still quite prevalent and are ...
In SQL injection attacks, malicious hackers can take advantage of poorly coded Web application software to introduce malicious code into a company’s systems and network. The vulnerability exists ...
SQL injection attacks have been the bread and butter of system crackers since the first SQL database became Web-enabled. Here, the Channel Test Center offers a step-by-step strategy for blocking them.
Respondents taking part in a new study from the Ponemon Institute say they've had their eyes opened to the realities of SQL Injection, and the impact it has on their organization.
Since the consequences of SQL injection attacks can be so damaging, I asked Michael Sabo of DB Networks about best practices that companies can follow in order to reduce their risk of this threat.
While the attack was a SQL injection attack that attacked and compromised back-end databases courtesy of vulnerable Web pages, from a user's perspective the real attack was compromised Web pages ...
SQL injection attacks exist at the opposite end of the complexity spectrum from buffer overflows, the subject of our last in-depth security analysis.