Screencast: Google hacking, infosec style

In this exclusive screencast step-by-step demo, Tom Bowers explains how to ensure an organization's intellectual property doesn't fall into the wrong hands.

Can't see the screen?

Watch Tom Bowers' Google hacking demonstration in a larger window.
Search engines and tools are not only handy when it comes to finding something on the Web, but they can also help security professionals ensure an organization's intellectual property doesn't slip off the network and into the public domain.

In this step-by-step demonstration, SearchSecurity.com contributor Tom Bowers demonstrates how some basic "Google hacking" methods can offer fascinating competitive intelligence for your enterprise.

About the author:
Tom Bowers, managing director of security think tank and industry analyst firm Security Constructs, holds the CISSP, PMP and Certified Ethical Hacker certifications, and is a well-known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. Bowers serves as the president of the 600-member Philadelphia chapter of Infragard, is a technical editor of Information Security magazine, and speaks regularly at events like Information Security Decisions.

Learn more about Google hacking:

This was first published in August 2007

Dig deeper on Security Testing and Ethical Hacking

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close