SQL Injection - Are Developers to Blame for Data Security Breaches?
Of course, this is a bold statement, but for those who deal with security issues from mobile applications, they can pinpoint where the flaw occurred with developers not taking security into account when developing mobile apps. Security takes the back seat to app functionality and remains as a second thought.
Companies who develop mobile apps think about the security of the app after the coding is done. Seriously we can’t expect to adequately ensure the security of the data, app, the communication between the app and the servers by patching here and there afterward. One common security breach is done via SQL injection due to flaws in the code. Fierce IT Security "estimates that 97 percent of data breaches are the result of an SQL injection attack somewhere along the line.” According to Mashable, "a British hacker used an SQL injection attack to breach the United States Federal Reserve, steals confidential data and posts it online." The Federal Reserve is a huge financial company with millions, if not billions at its disposal and it was still unable to stop a "straightforward SQL injection attack."
Another breach in security was the hacker who used an SQL injection attack to steal 150,000 user emails and passwords from an Adobe database. This type of attack can "be prevented by app developers adhering to security best practices during the app development and testing phases." At this time, many companies are open to hacker attacks. In 2013, two-thirds of US companies were breached by an SQL inject attack. Even Wall Street is not safe from an SQL injection attack.
Most of these flaws can be prevented by using best practices when developing mobile apps, spending more time thinking, designing and embedding security into the apps in addition to testing rather than pushing them out as fast as they can.
Some hackers say they break into these databases to show companies where the flaw is, to raise public awareness and make companies take security seriously. But many hackers do that for their 5-minutes (sometimes longer due to the severity of the breach) of fame on the news. Their fame is someone else nightmare. Not only it costs companies to fix the damage (some can take 140 days), it also cost them in customers for burdening them with the hassles to change credit card information, emails, and addresses and so on. We are very interested to know what developers think about this.
How To Avoid SQL Injection Types of Attacks with SeaCat Mobile Secure Gateway?
The SeaCat-enabled mobile application communicates with the SeaCat Gateway, the only visible point. The Gateway authorizes, authenticates and re-interprets traffic before passing it to the app’s backend. This scheme shields the backend from exposing itself the Internet and protects it from SQL injection attacks, buffer overflows, and zero-day vulnerabilities.
Mobile application security includes not only protection at the application level but also protection at the backend. Failing to secure the backend, where company's data is most vulnerable, is a recipe for disastrous consequences.
Photo Credit: imcreator
Data encryption tool for GDPRMore information
You Might Be Interested in Reading These Articles
MazelTov and the Russian Underground Have It Going for Your Android Devices. But Not for Good Reasons
The Internet has been a good place for individuals and businesses. However, it's fast-becoming a leading medium for criminals in this cyber war against people like you and I. One example is the Russian underground that sell anything to do with cyber crime. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents.
Published on May 19, 2015
Every week there is a new connected device on the market. A few days ago Tag Heuer launched its smartwatch with Google, and last week I saw a €39 sleep tracker in my supermarket plaster section. Tech conferences are buzzing about the Internet of Things (Consumer Electronics Show 2015, Pioneers Festival 2015).
Published on November 24, 2015
The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.
Published on April 04, 2017