Access "Google Hacking: Why being a Google dork is hurting your company"
This article is part of the March 2006 issue of Captive to SOX compliance? A compliance guide for managers
A simple search can expose security secrets. Black hats are aware of it. Are you? More information from SearchSecurity.com Learn how to Google hack your business before black hats do. Our glossary definition of Google hacking provides basic preventative measures. Visit our resource center for tips and expert advice on hacking tools and techniques. Dorks love Google. Being a Googledork, however, is nothing to aspire to. Yes, that's an actual term. Haven't heard of it? Well, it's about time you did. Googledork refers to anyone who has unknowingly exposed sensitive information on the Web, enabling search engines to index material that wasn't intended for public consumption. Are you a Googledork? Are your coworkers? Think long and hard. Then do a pen test to make sure you and your company are in the clear. You might be surprised at what you find. Google hacking--the practice of using specially crafted search engine queries to cull information about a target--is now a feather in virtually every black hat's cap. They're pulling off real intrusions, using real ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Compliance Guide for Managers
SPECIAL How to influence the C-suite, save your company money, please auditors and secure your data.
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Portable device security: Centennial Software's DeviceWall 3.1
Read a security product review of Centennial Software's DeviceWall 3.1.
-
Secure from the Start
SOFTWARE DEVELOPMENT Get off on the right foot by working with your developers to ingrain security in the coding process.
-
Integrated Security
Symantec's Gateway Security 5600 series
-
Compliance Guide for Managers
-
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Hot Pick: NFR Security's Sentivist 5.0
NFR Security's Sentivist 5.0
-
Google Hacking: Why being a Google dork is hurting your company
Are you a Google dork? A simple Google search engine query can expose corporate security secrets and private information. Black hats are aware of it. Are you? Learn how to prevent and defend against Google hacking.
-
Unplugged
PRODUCT REVIEW Even if you don't have an unauthorized WLAN, you need protection.
-
Recent Releases: Security product briefs, March 2006
-
Columns
-
Editor's Desk: The case for application-layer security
C++ - Security = 0
-
Layer 8: Military, defense sectors offer little security leadership
Military Madness
-
Prespectives
No Guarantee
-
Ping: William Pelgrin
William Pelgrin
-
Editor's Desk: The case for application-layer security
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO