Get a Pentest and security assessment of your IT network.

News

Researchers Show How SQLite Can Be Modified to Attack Apps

Researchers at Check Point Software Technologies have developed a new technique that shows how attackers can trigger and exploit a wide range of memory safety issues in the SQLite engine using nothing other than the language. It is the first research to show how queries can be modified and used to execute malicious commands in applications that use SQLite to store data. The research shows that querying a database may not be as safe as assumed, Check Point researcher Omer Gull said. The boundaries of what constitutes trusted and untrusted SQL input need to be revisited, he said.”]

Source: https://www.darkreading.com/attacks-breaches/researchers-show-how-sqlite-can-be-modified-to-attack-apps

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Thousands of Magento websites compromised to serve malware

News

Office 365 Secure Score: An Introduction