Tech News

Familiar With SQL Injection Vulnerability – Meet Ihsan Sencan

Meet Ihsan Sencan, a security researcher from Turkey who found more than 15+ SQL Injection Vulnerabilities in various Joomla Components in just one day and all related exploits have been published to various portals like Exploit-db.com, packetstormsecurity.org, cxsecurity.com and 0day.today etc. He also found more than 50+ SQL Injection Vulnerabilities in other Joomla Components/Modules in […]

Tech Articles

4 Best ways to Prevent SQL Injection Vulnerability [PHP]

SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands […]

Tech Articles

SQL Injection Prevention – A Practical Approach

SQL injection is a technique, used to attack data-driven applications. Using this method, hackers will try to execute their SQL statements within your application and access your database data. Here is an example SQL injection. Let’s consider you have a login form with two fields – username (text field) and password (password field). Upon login, […]

Tech Articles

Simple Tips to Prevent SQL Injection Vulnerability

As seen from the previous articles, SQL injection has the ability to attack a web server database, compromise critical information, and expose the server and the database to a variety of malicious exploits; however, there are measures that can be applied to mitigate SQL injection attacks. Use of these practices does not guarantee that SQL […]