News

SQL Injection is a fairly new method of hacking your database. Learn how it’s done—and how to protect yourself.
In the past, phone phreakers used what we now think of as hacking techniques to access mainframe computers and programmable telephone switches to obtain information, alter records or evade capture.
You can find any amount of SQL database dumps as well (fooling around with a Google hack while preparing this article, I stumbled across a dump for a top-tier CMS developer's website).
SQL injection attacks are among the most common security threats businesses face, and they're on the rise.
Distributed denial of service and SQL injection are the main types of attack discussed on hacking forums, according to new research from security vendor Imperva.
A SQL injection flaw can allow a hacker to enter commands into a web-based form and get the backend database to respond. The compromise happened around July 2012, wrote Bit9’s CTO Harry Sverdlove.
Distributed denial of service and SQL injection are the main types of attack discussed on hacking forums, according to new research from security vendor Imperva.