Are there security concerns that might prevent database systems from providing password data types?

Software development environments seem to benefit when problems can be solved "higher up the chain".
For example, many web platform features that are now natively supported in both JavaScript and CSS used to require much labor an… Continue reading Are there security concerns that might prevent database systems from providing password data types?

What methods can be used to hold Acunetix accountable for their software being used with criminal intent? [closed]

One server I have access to has occasionally presented logs that show traffic from Acunetix Vulnerability Scanner. I don’t have an account with Acunetix, nor does anyone who has legal ownership of this server.
Upon contacting Acunetix, the… Continue reading What methods can be used to hold Acunetix accountable for their software being used with criminal intent? [closed]

Does this registry entry for implementing custom protocol handlers in Windows present a security risk?

Background
Some features are not yet available on the web platform and thus require cooperation with a native application in order to provide them. One method for a web application and a native application to communicate with each other is… Continue reading Does this registry entry for implementing custom protocol handlers in Windows present a security risk?

Does MySQL error "Illegal mix of collations" imply an SQL injection vulnerability?

The user input of a given query is being sanitized (PHP, real_escape_string), yet the query fails with “Illegal mix of collations”. This query is below:

SELECT * FROM `table` WHERE `column` = “�½��ļ���.zip”

Does this imply… Continue reading Does MySQL error "Illegal mix of collations" imply an SQL injection vulnerability?