Search Engines Used to Attack Databases

Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. In fact, an attacker can data mine any of the commonly used search engines to find target databases to attack.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Enabling Real-Time Sharing and Synchronization over the WAN

Driven by increasing business demands and the availability of technologies like in-memory databases, change data capture software, big data storage systems, and complex event processing engines, some organizations are looking to enterprise data grids to accelerate, optimize, and scale their IT infrastructure. Managing big data scale transactional and event stream information is about more than just storing massive amounts of data; it requires the intelligent collection, filtration, sharing and exposure of information via enterprise apps connected by LANs, WANs, and cloud/grid environments.
  • Written By:
  • Published On:

Usability as an ERP Selection Criteria

Enterprise resource planning (ERP) software is often criticized for being complex and difficult to use—which puts up a barrier to receiving potential benefits. Systems with integrated search functionality and Web-like interfaces can make ERP solutions easier to use. Learn how to evaluate ERP software for its usability, so you can avoid investing in platforms that aren’t evolved toward usable and efficient interfaces.
  • Written By:
  • Published On:

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Going from Good to Great

Creating a great Website depends on strategy, and the investment of time and energy in continuous improvement. Learn how techniques like search engine marketing and search engine optimization (SEM and SEO), maximizing lead generation, increasing conversions, improving customer service, and engaging target audiences can take your Website from good to great—and help you maximize return on investment (ROI).
  • Written By:
  • Published On:

“Skunkworks” for Search Engine Marketing and Optimization

Search engine marketing (SEM)? We’re talking about tactics for Web site promotion—increasing both a site’s visibility to Google (and other search engines) and the site’s prominence in search engine results. We’re talking about pulling visitors through search engine optimization (SEO) and improved organic listing and using paid placement to push visitors to a site. Learn more about how to develop an effective SEM process.
  • Written By:
  • Published On:

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware

Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.
  • Written By:
  • Published On: