News

A new tool is making the rounds on the criminal underground. Called Katyusha Scanner, this is a hybrid between a classic SQL injection (SQLi) vulnerability scanner and Anarchi Scanner, an open ...
To protect against SQL injection attacks the developer of the Web site or application must use industry best practices outlined here.
Researchers say a bug let them add fake pilots to rosters used for TSA checks TSA security could be easily bypassed by using a simple SQL injection technique, say security researchers.
SQL injection attacks exist at the opposite end of the complexity spectrum from buffer overflows, the subject of our last in-depth security analysis.