A carefully crafted attack can convince a database to reveal all its secrets. Understanding the basics of what the attack looks like and how to protect against it can go a long way toward limiting the threat.
from Dark Reading: https://ift.tt/2XaFi5v
via IFTTT