penetration testing
The importance of ethical hacking
The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud …
Nessus 5.0.1 vulnerability scanner released
Tenable release of Nessus 5.0.1, a vulnerability and configuration assessment solution for enterprises and security professionals. This release improves the stability on all …
0-day in Backtrack Linux found, patched
A zero-day vulnerability affecting the last version of Backtrack Linux has been spotted by a student during an Ethical Hacking class organized by the InfoSec Institute. The …
Maltego 3.1.1 Community Edition released
Maltego is a platform developed to deliver a clear threat picture to the environment that an organization owns and operates. The unique perspective that Maltego offers to both …
Penetration testing tips, tricks and unusual situations
Raul Siles is a senior security analyst with more than 10 years of expertise performing advanced security services. He is a SANS Institute author and instructor of penetration …
Metasploit: The Penetration Tester’s Guide
Metasploit Framework (MF), the open source tool for launching exploits against remote machines, is a well-loved instrument that allows penetration testers to automate routine …
Multifunction printer hacking
A great number of multifunction printers of have the ability to integrate within a corporation’s business environment and connect to its email systems, its file systems, …
A new security strategy for Sony
2011 was a tough year for Sony. Having been attacked over 20 times by hacktivists going after its websites, the PlayStation Network, its customers’ and company …
ElcomSoft adds AMD Radeon 7000 Series support
ElcomSoft updated its Phone Password Breaker and Wireless Security Auditor with OpenCL support, adding support for the latest AMD Radeon Graphics and ensuring universal …
Researchers compromise e-voting system
A group of researchers from the University of Michigan has recently attacked and managed to compromise the Washington, DC Digital Vote by Mail Internet voting system, proving …
Metasploit identifies IPv6 security risks
Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …
Acunetix Web Vulnerability Scanner 8 released
Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking experience through its new ability to lock hackers out by integrating scan results into …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments