Tag "Database Security"

Back to homepage
Industry Insights

LinkedIn Data Found in Unsecured Databases

A security researcher identified eight unsecured databases that held “approximately 60 million records of LinkedIn user information.” GDI Foundation, where the security researcher is from, is a nonprofit organization with a

Expert Articles

Database Hacking & Its Prevention

By Arpit Jain, Cyber Security Engineer at NetWeb Software, SQL Stands for Structured Query Language. It’s a standard language to access, read & write databases. It is a simple language

Hardware/Network

Hacker behind Collection #1 credential database identified

The threat actor was believed to be working on this breach for over two to three years. Known by the pseudonym ‘C0rpz’, it was hinted that there was more than

Software

Two Elasticsearch Databases Found Unprotected

After news broke that an Elasticsearch server belonging to several online casinos was left without a password, independent security researcher Bob Diachenko discovered another unprotected Elasticsearch database from AIESEC, a global, youth-run nonprofit. Click

Identity Theft

Breach — How To Find Out If Your Password Has Been Stolen

Yesterday, it emerged that a set of over 2.7 billion email addresses and passwords had been posted to a hacking forum for anyone to see in a mega-breach dubbed Collection #1. The

Software

Get Rid of your Database Security “Hairball” with Database Security 2.0

The increasing sophistication of threats and the on-going evolution of database technology has made database security one of the most elusive tasks to do well. Traditional database security implementations (called

Software

Why good database security planning is essential for protecting a company’s most important assets

Attackers know that shutting companies out of their own data can quickly cripple an organisation and put the pressure on to consider paying the ransom.Data is firmly established as one

Software

Trust flourishes in blockchain

if implemented effectively, blockchain has the potential to transform the way we do business. After several years spent in the shadow of bitcoin, it’s time for blockchain, the technology on

Software

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of

Software

Why Blockchain Is No Silver Bullet For Cyber Threats

What is blockchain? First, imagine a spreadsheet that’s reproduced thousands of times across a network of computers. Then imagine that this network is designed to regularly update this spreadsheet and