The Latest SQL Injection Trends

 
SQL injection attacks, in which malicious SQL statements are inserted into an entry field for execution, are one of the most common attack vectors across the globe. SQL injections exploit security vulnerabilities in an application’s software and can be used to attack any type of SQL database.   In the past year, Check Point has created several adjusted SQL injection protections for our IPS software blade. By analyzing the traffic that triggered these protections in networks monitored by Check Point’s Managed Security Service, we can see the current trends and patterns in SQL injection attack attempts.     SQL injection through ...

Using Collaboration to Stop the Next Massive Cyberattack

 
Cybercriminals attempt attacks on organizations every day. Most often, these attacks catch the victim organization off-guard, or underprepared. While cybercriminals do engage in random attacks, often, the victim has been targeted. In these cases, the hacker has most likely been plotting the attack for quite a while and knows their target perfectly. They know what they’re searching for, and over the past few years, these criminals have become more innovative in their approaches. By using new methods, they have been able to shake up even the most secure organizations and create malicious chaos.   As advanced threats continue, the need for holistic, multi-layered threat prevention ...

Apple’s iOS Proven Vulnerable (Again!) as Android Leaks Biometric Info – Mobile Security Weekly

 
We may have missed one or two weekly updates, but this week’s issue definitely makes up for it. Three serious issues have the ability to affect millions of mobile users around the world. Two of these affect iOS users, so Apple might not be as far ahead security-wise as it would want you to believe. Researchers discover iOS8 Wi-Fi Vulnerability Researchers have released details on a vulnerability in iOS 8 which can be exploited by malicious wireless hotspots in order to repeatedly crash and reboot nearby iOS devices. The denial-of-service is triggered by manipulating SSL certificates sent to the iOS devices over Wi-Fi. Specially, customized ...