The root of MySQL's security evil?

Thursday, 10 February 2005, 12:03 PM EST

The recent worm attack that hit thousands of MySQL installations reflects a growing trend in the malware world. This worm doesn't exploit a weakness in the MySQL code--it exploits lazy admins who could protect themselves with one simple step.

The MySQL worm, like many others, uses a brute-force attack to guess a target's root password. Far too often, it only needs one guess: the default password, which the admin never changed.

By Matt McKenzie at Linux Pipeline.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //