Describe an SQL injection?
The inputted content in a form could be used maliciously in situations when the content is directly input into a database. One of the top ten attacks
What does OWASP stand for?
Open Web Application Security Project
Name two large-scale victims of sql injection attacks?
LinkedIn and Yahoo!