Nieuws

The Web servers are all patched, configured to perfection, strong passwords and encrypted communication all around. Nothing but a divine act is going to compromise the security of the Web site ...
Security researchers have developed a generic technique for SQL injection that bypasses multiple web application firewalls (WAFs). At the core of the issue was WAF vendors failing to add support ...
Google has announced support for the HTML 5 Web SQL Database API, and others are likely to follow soon or have already started on support for this API. In the meantime, the completion of the ...
SQL injection attacks allow a malicious user potentially unlimited access to the content in your application’s database, no matter what security the application has tried to enforce.
SQL Injection SQL Injection involves entering SQL code into web forms, eg. login fields, or into the browser address field, to access and manipulate the database behind the site, system or ...
However, until last week, it lacked the capability of emulating SQL injection vulnerabilities, an important class of Web application vulnerabilities that are commonly targeted by attackers.
In a recent blog post, Daniel Cid, CTO of Securi, a company that provides website security monitoring and related services, published details of a recent SQL Injection attempt. That in itself isn ...