Please turn on your JavaScript for this page to function normally.
Test your defensive and offensive skills in the eCSI Hacker Playground

BalaBit and Silent Signal today announced that registration is now open for the eCSI Hacker Playground. The hacker challenge is a global online competition, specially designed …

raspberry pi
Penetration Testing With Raspberry Pi

Authors: Joseph Muniz, Aamir LakhaniPages: 142 pagesPublisher: Packt PublishingISBN: 1784396435 Introduction Raspberry Pi is a small and portable single board computer that …

Researchers mount cyber attacks against surgery robot

A group of researchers from University of Washington have tested the security of a teleoperated robotic surgery system created by their colleagues, and have found it severely …

Ethical connected car hacking service launched

A new security service developed to test the exposure of connected vehicles to cyber-attacks and help all market players develop security solutions has been launched by …

IT professional, hack thyself

To anyone not living under a rock, the increasing threat of a cyber attack is very plain. IT professionals spend sleepless nights worrying that they’ll be the next …

How a penetration test helps you meet PCI compliance guidelines

In order to protect credit card data, sometimes businesses have to think like a hacker. Every year, merchants who transmit, process, or store payment card data must conduct a …

Has the time come to give up penetration testing?

By carrying out “white hat’ attacks to identify potential entry points in the externally facing parts of an organization’s IT network, such as its firewalls, …

Researcher publishes JavaScript DoS tool

Trigger-happy attackers looking for additional ways to bring websites to their knees by means of a DoS attack have been given another tool that can aid in their efforts: …

Ideas
Hacking and Penetration Testing with Low Power Devices

This book is primarily intended for penetration testers who want to widen their skill set to include the knowledge of how to perform testing with small, low-powered devices …

Kali NetHunter turns Nexus devices into portable hacking tools

Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community …

Using thermal imaging for security

Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help …

Lessons learned from running 95 bug bounty programs

Large companies such as Google and Facebook have dedicated teams that review bug submissions, verify valid bugs and reward security researchers, but that can be time and …

Don't miss

Cybersecurity news