Internet Security, Identity Theft, Recent IT Trend, EV, SSL Digital Certificate Technology

Hi,I am Yuvaraj (Yuvi),From my recent readings I analysed that Internet Security is the need of the hour, so was interested in covering IT, Technology & Security Industry News on my webblog. This Blog would also share and discuss about the imporatance of Secure EV SSL Digital Certificate Technology, VPN and other related online website security measures. If you wish you read my internet marketing blog visit

My Photo
Location: Chennai, Tamilnadu, India

Ah! The toughfest question....but to point out a few firstly its my Job and then I am interested in Online Marketing, Internet Security Awareness, Blogging, Computers & Internet and so on.....

Wednesday, February 11, 2009

Hacking Alert! Hackers Target Databases –Hack using SQL injection

It has been a week ago, a Romanian has hacked the website of the antivirus software producer using SQL injection to steal the data. Many wonder what kind of databases are being handled by security companies, but there are databases that are really worth which include customer emails, software activation keys, personal details of the customers and other related information, which are being stored in the database server. Then wonder, how much confidential databases should a company which involve financial trasactions would handle. So if the server has got minor vulnerability also, the hacker can easily enter in to the server, by manipulating a URL, and passing certain SQL commands – which is termed as SQL injection. So it is always good for top level companies to use high-end database backup software, and have a regular system check to patch the security holes in the computer. Though the companies understand the importance of computer security and server security, due to high work upload, they sometime fail to update their security patches, which leads to such kind of hacking attacks.

This is an instance that happened, and has alerted the big players in the market, who deal with huge volumes of databases. Now most of them knew that hackers not only target the banking or consumer databases but also target whatever databases are available from pin to plane, which a hacker can monetize it.

Labels: , , ,

Links to this post:

Create a Link

<< Home

Useful Resources