Injection attacks

Source : https://www.google.com.pk/search?q=Why+IoT+Security+Needs+an+Inside-Out+Approach&biw=1366&bih=633&source=lnms&tbm=isch&sa=X&ei=VdCKVbaHH4jdywOb2bmwAQ&ved=0CAYQ_AUoAQ#tbm=isch&q=Injection+Attack&imgrc=VgqaeDHqu_JHaM%253A%3BsgMG2MILqvLdIM%3Bhttp%253A%252F%252Fwww.thetechherald.com%252Fmedia%252Fimages%252F201148%252FInjection-attacks-target-legit-websites-twenty-nine-thousand-sites-and-counting-Security4_1.jpg%3Bhttp%253A%252F%252Fwww.thetechherald.com%252Farticles%252FInjection-attacks-target-legit-websites-twenty-nine-thousand-sites-and-counting%252F7220%252F%3B600%3B400