News

SQL Injection Attack: What is it, and how to prevent it. The way that Yahoo! was hacked, SQL Injection attack, is the same method as many other hacks in the news recently: SQL Injection.
Filtering and monitoring tools at the Web application and database levels will help block attacks and detect attack behavior in order to mitigate risk of exposure to mass SQL injection attacks.
Application security SaaS company Indusface has detailed the potential financial impact of SQL Injection attacks on businesses.
SQL injection attacks have been the bread and butter of system crackers since the first SQL database became Web-enabled. Here, the Channel Test Center offers a step-by-step strategy for blocking them.
SQL injection attacks are common & costly, but IT Leaders can prevent them in a few ways. Here's how to protect against sql injection attacks and examples.
As much as making your T-SQL work smarter for you, a la dynamic SQL, is helpful, it can also introduce a significant about of risk. I'm speaking specifically about SQL injection attacks.
SQL injection has plagued databases for years. Here's a look at how the attacks work -- and what you can do about them ...
SQL injection attacks exist at the opposite end of the complexity spectrum from buffer overflows, the subject of our last in-depth security analysis.
Attack chain The attacks Microsoft observed start with exploiting an SQL injection vulnerability in an application in the target's environment.