Researchers Show How SQLite Can Be Modified to Attack Apps
August 13 2019New technique involves query hijacking to trigger a wide range of memory safety issues within the widely used database engine, Check Point says. The near-ubiquitous presence of the SQLite...
Read more
Recent Comments