SQL Injection - Are Developers to Blame for Data Security Breaches?
Of course, this is a bold statement, but for those who deal with security issues from mobile applications, they can pinpoint where the flaw occurred with developers not taking security into account when developing mobile apps. Security takes the back seat to app functionality and remains as a second thought.
Companies who develop mobile apps think about the security of the app after the coding is done. Seriously we can’t expect to adequately ensure the security of the data, app, the communication between the app and the servers by patching here and there afterward. One common security breach is done via SQL injection due to flaws in the code. Fierce IT Security "estimates that 97 percent of data breaches are the result of an SQL injection attack somewhere along the line.” According to Mashable, "a British hacker used an SQL injection attack to breach the United States Federal Reserve, steals confidential data and posts it online." The Federal Reserve is a huge financial company with millions, if not billions at its disposal and it was still unable to stop a "straightforward SQL injection attack."
Another breach in security was the hacker who used an SQL injection attack to steal 150,000 user emails and passwords from an Adobe database. This type of attack can "be prevented by app developers adhering to security best practices during the app development and testing phases." At this time, many companies are open to hacker attacks. In 2013, two-thirds of US companies were breached by an SQL inject attack. Even Wall Street is not safe from an SQL injection attack.
Most of these flaws can be prevented by using best practices when developing mobile apps, spending more time thinking, designing and embedding security into the apps in addition to testing rather than pushing them out as fast as they can.
Some hackers say they break into these databases to show companies where the flaw is, to raise public awareness and make companies take security seriously. But many hackers do that for their 5-minutes (sometimes longer due to the severity of the breach) of fame on the news. Their fame is someone else nightmare. Not only it costs companies to fix the damage (some can take 140 days), it also cost them in customers for burdening them with the hassles to change credit card information, emails, and addresses and so on. We are very interested to know what developers think about this.
How To Avoid SQL Injection Types of Attacks with SeaCat Mobile Secure Gateway?
The SeaCat-enabled mobile application communicates with the SeaCat Gateway, the only visible point. The Gateway authorizes, authenticates and re-interprets traffic before passing it to the app’s backend. This scheme shields the backend from exposing itself the Internet and protects it from SQL injection attacks, buffer overflows, and zero-day vulnerabilities.
Mobile application security includes not only protection at the application level but also protection at the backend. Failing to secure the backend, where company's data is most vulnerable, is a recipe for disastrous consequences.
Photo Credit: imcreator
Data encryption tool for GDPRMore information
You Might Be Interested in Reading These Articles
In October 2015, Blakely Thomas-Aguilar did a great article on mobile security statistics on the VMware AirWatch blog that can and will send shivers down your spine. For example, she found that there was an increase of 18% in the number of Android vulnerabilities between 2011 and 2015.
Published on July 26, 2016
At our company, we develop our own software products that we offer to our clients and often also run ourselves. So far our company has operated its IT infrastructure — about 30 virtual servers—on a public cloud, specifically on MS Azure.
Published on July 01, 2018
Mobile are everywhere nowadays and a central part of almost everyone's lives. In fact, we are using them for everything - both for personal and business purposes. From streaming media entertains us on our way to work, to chatting with friends and family, to sending emails at work - mobiles are now effectively computers on the go. According to a study from Cisco, we are using mobile access more and more. And this trend will continue well into the future.
Published on October 25, 2016