Sunday, October 13, 2019

One mor article about SQL injections


John Dee, a security expert from MacSecurity shared this post to teach you the basics of SQL injections.
SQL injections are responsible for executing some malicious statements in the target system. These SQL statements are basically designed to control the web application’s database server. The hackers try to bypass the security measures of the application by injecting these malicious statements.
These injections can harm a variety of web applications and websites, especially the ones that use SQL databases such as SQL, Oracle, and MySQL servers. It helps criminals to gain unauthorized access to sensitive data on the website. They may steal intellectual property, trade secrets, personal data and other essential information of customers. Note that SQL attacks are the oldest type of attacks launched by hackers, and they can cause the most dangerous vulnerabilities. 

Full text can be found here:

https://portal.asun.edu/ICS/Academics/UNIV/UNIV__1001/141T-UNIV__1001-J2_31/News_and_Announcements.jnz?portlet=News_and_Announcements&screen=View+Post&screenType=next&Id=babee36e-5fa3-43f2-adfc-15f4775d7d1b

https://portal.asun.edu/ICS/Academics/UNIV/UNIV__1001/141T-UNIV__1001-J2_31/News_and_Announcements.jnz

New infosec job

MacSecurity analyzes virus samples from around the world and releases updates and virus removal guides immediately after identifying a new threat. If you want to contribute to information security and feel the spirit of a researcher, this position is for you. After basic training, you will be involved in studying the behavior and structure of malicious programs, create new methods of detection and protection. The range of tasks is vast, and you can choose the direction you like. Full job description can be found here: https://cs.byu.edu/job-posting/malware-analyst

New article about spoofing attacks

Before we get into the details of e-mail, IP, and phone spoofing attacks, let us get a quick overview of the fundamental concept underlying spoofing. Spoofing is primarily the act of veiling an attack under the name of a trusted source through the internet to a target victim from an unreliable outlet. Apart from the channels mentioned in the preceding line, spoofing can also be conducted through the Address Resolution Protocol (ARP) or Domain Name System (DNS). More here:
http://shared.esade.edu/sites/eabis/Lists/Eabis/DispForm.aspx?ID=2265