SQL injection attacks can be stopped, says security expert

One of the oldest ways of attacking an SQL database is still successfully being exploited by criminals to gain access to personal information, yet according to one expert it’s easy to prevent. That’s

Published on: August 7th, 2014 Howard Solomon

Hacker steals e-mail addresses, demands Astley tune

Dutch hacker Darkc0ke hijacked a radio station database containing 22,000 e-mail addresses and threatened to publish them unless the station play Rick Astley's "Never Gonna Give You Up," a variation of an Internet

Published on: May 19th, 2010 loek essers

Heartland and TJX hacker pleads guilty in third case

The hacker who enabled the theft of millions of credit card numbers from Heartland Payment Systems Inc. (NYSE: HPY), TJX Companies Inc. (NYSE: TJX) and others has pleaded guilty to two counts of

Published on: December 30th, 2009 Nancy Gohring

One in five Web attacks aimed at Facebook, other social nets

One in five online attacks are aimed at social networks,  such as Facebook, says Nebulas Solutions Group.   The security firm's Web Hacking Incidents Database (WHID) 2009 Bi-Annual Report, which is conducted in conjunction

Published on: August 20th, 2009 Carrie-Ann Skinner

Obama campaign hopes for better Web security

Two months after their Web site was hacked, the organizers of Barack Obama's presidential campaign are looking for a network security expert to help lock down their Web site."Obama for America is looking

Published on: June 13th, 2008 Robert McMillan

Researchers expose RFID security holes

University researchers in Amsterdam have discovered a way to plant a virus on radio frequency identification (RFID) tags, potentially infecting enterprise back-end software systems and spreading from one RFID tag to another. In

Published on: April 13th, 2006 Mari-Len De Guzman

BLACK HAT: Google now a hacker’s tool

Somewhere out on the Internet, an Electric Bong may be in danger. The threat: a well-crafted Google query that could allow a hacker to use Google's massive database as a resource for intrusion.

Published on: August 2nd, 2005 Robert McMillan

securing your web apps

Given that corporate security is only as good as its weakest link, Web applications — arguably the weakest link — were the subject of a hacking workshop recently held in Toronto. Covering topics

Published on: May 13th, 2004 Chris Conrath