Email Alerts
-
New SQL injection technique threatens Oracle databases
A technique called lateral SQL injection exploits PL/SQL procedures to compromise Oracle databases remotely. Article | 24 Apr 2008
-
Oracle fixes 41 flaws in April CPU
Attackers could exploit several Oracle flaws to compromise the confidentiality and integrity of targeted systems, Symantec said hours after Oracle's April 2008 CPU was released. Article | 16 Apr 2008
-
Discarded hard drives can be dangerous
A treasure trove of sensitive information can end up in the wrong hands if old hard drives aren't properly disposed of, one security expert warns. Article | 17 Jan 2008
-
Oracle patches serious holes with latest CPU
Vulnerabilities in Oracle Application Server can be exploited remotely to hijack a system, according to Oracle's latest Critical Patch Update. Article | 16 Jan 2008
-
Survey finds thousands of database servers open to attack
Security expert David Litchfield found hundreds of thousands of Microsoft SQL Server and Oracle database servers available on the Internet and not protected by a firewall. Article | 14 Nov 2007
-
Symantec adds intruder identification to database security software
Symantec entered the database security market last year and is now introducing intruder identification and tighter integration with its security suite. Article | 30 Oct 2007
-
Oracle plugs critical database, application holes
Oracle fixed critical flaws in database 10g and 9i, Application Server 10g, and E-Business Suite 11i. Article | 16 Oct 2007
-
Oracle CPU to contain 51 flaw fixes
Oracle's Critical Patch Update will address 51 fixes, addressing critical holes in Oracle database 10g, Application Server, E-Business Suite and PeopleSoft Enterprise software. Article | 12 Oct 2007
-
Critical flaw discovered in IBM DB2
IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system. Article | 04 Sep 2007
-
Compliance, data breaches heighten database security needs
Experts say database platforms lack robust native encryption, monitoring, assessment and management tools to meet demanding new security requirements. Article | 16 Aug 2007
Security Management Strategies for the CIO