I am sure there is a lot of code out their vulnerable to SQL Injection, namely ASP code. But I have never seen anyone write new code that way for years. I think it is written about so much mainly because it is easy to explain to non-techies.
"Another is to “use SQL libraries that take care of input sanitization for them,” Al-Bassam suggested. This, in short, scrubs any data entered by the user to remove any potential malicious parts of it."
This is bad advice. Some people have apostrophes in their name. Deal with it.
Sure, I really meant always use some library that will do whatever is needed to pass potential unsafe characters over to SQL and that sanitization doesn't mean you have to delete these characters. Obviously relying on yourself to properly escape everything is going to fail.