Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The number of SQL Injection attacks seen by one vendor increased by two-thirds between Q1 and Q2 this year.
According to secure cloud hosting company FireHost, its users were protected from a total of 17 million cyber attacks during the period of April to June 2012.
It also claimed that there was a 69 per cent increase in SQL Injection attacks between Q1 and Q2, rising from 277,770 blocked attacks to 469,983.
Chris Hinkley, senior security engineer at FireHost, said that as SQL Injection attacks are often automated, many website owners may be blissfully unaware that their data could actively be at risk.
“These attacks can be detected and businesses should be taking basic and blanket steps to block attempted SQL Injection, as well as the other types of attacks we frequently see,” he said.
The recent password breach of Yahoo! Voices was enabled by a union-based SQL injection vulnerability in the application, leading to 400,000 Voices account usernames and passwords being stolen and published online.
Todd Gleason, director of technology at FireHost, said: “Some of the data theft incidents that are reported in the media are precisely targeted, but a more substantial risk to most comes from an abundance of automated, malicious bots that attack websites in a more random fashion.”
Recent research by White Hat Security found that while SQL injection is a prevalent website vulnerability, it only affects 11 per cent of websites and flaws are fixed in an average of 53 days. It claimed that five per cent of all websites it evaluated had at least one SQL injection vulnerability that was exploitable without first needing to login to the website.
The April 2012 'State of Software Security Report' from Veracode, said that SQL injection remains one of the two most frequently exploited vulnerability types (along with cross-site scripting), with a statistically flat incidence rate from the first quarter of 2010 to the fourth quarter of 2011.
This article originally appeared at scmagazineuk.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.