Get a Pentest and security assessment of your IT network.

News

Researchers Show How SQLite Can Be Modified to Attack Apps

Researchers at Check Point Software Technologies have developed a new technique that shows how attackers can trigger and exploit a wide range of memory safety issues in the SQLite engine using nothing other than the language. It is the first research to show how queries can be modified and used to execute malicious commands in applications that use SQLite to store data. The research shows that querying a database may not be as safe as assumed, Check Point researcher Omer Gull said. The boundaries of what constitutes trusted and untrusted SQL input need to be revisited, he said.”]

Source: https://www.darkreading.com/attacks-breaches/researchers-show-how-sqlite-can-be-modified-to-attack-apps

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin