This post was provided by Samantha Strauss on behalf of Drexel University Online. She has written freelance tech articles for a number of educational institutions, including Drexel University. A self-taught programmer, she has spent over a decade working in the tech industry.
Though it’s been plaguing us for quite a while, SQL injection is still one of the most common forms of web site security breaches, as evidenced by recent hacking attacks on such web giants as Sony, Yahoo and LinkedIn, among others. SQL, which stands for Structured Query Language, is just what it sounds like: a language–almost, in fact, THE language that databases use to store, manage, and retrieve information. Continue reading
A recent NakedSecurity.Sophos.com article reports that a vicious “malware attack has been spammed out widely via email to Internet users, posing as a message about photos.”
The attack’s payload is the Blackhole exploit kit, a vicious and self-protecting malware controller which injects the following malware onto computers:
This is the time of the year that all the correspondents write their “prediction” articles for the next year. You’ve probably seen some of them; they have titles like: “5 Malware Predictions for 2013”, “Security Predictions for 2013”, etc. They are usually well-written by writers knowledgeable in Internet security, but sometimes they’re written by employees of security software companies. The latter I’ve always suspected were trying to sell their products by instilling fear in the populace.
This year I’ve decided to write a predictions article of my own, albeit a bit different from the usual fare. Continue reading