SQL injection attacks have become a hot topic again, following Computerworld's report that Oracle.comsuffered such an attack this
week. This kind of attack, one of the most well-known and dangerous but
least understood, was used to breach the security of Oracle's customer
website, exposing usernames and, in some cases, passwords.
To protect your databases, check out our excerpt from Justin Clarke's "SQL Injection Attacks and Defense." The
excerpt explains in detail exactly what an SQL injection is and how it
works so you can take appropriate steps to minimize vulnerability.
You
should also take a look on our password creation and management
resources, since these "stolen passwords" lists often expose users'
lackadaisical attitudes towards creating hard-to-break passwords. These
sample policies and policy templates can make sure that weak passwords
don't compromise data security: