Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Published on
In the SQL Injection -- by the Numbers video, we examine SQL injection headlines and statistics. Famous breaches, including the Sony, Nokia, Heartland Payment Systems, and Lady Gaga Website compromises, were all caused by hackers who used SQL injection to break into the applications' backend databases. LulzSec, the notorious hacktivist group, made SQL injection a key part of its arsenal. How prevalent are SQL injection attacks? How are hackers altering SQL injection attacks to bypass security controls? And most importantly, how do enterprises protect against this type of attack? All of these questions are answered in this informative SecuritySHORT.
Login to see the comments