Security Testing and Ethical Hacking News
September 15, 2016
Oracle's lack of response to security researchers raises more questions after a zero-day MySQL vulnerability was reported, though patches may have already been released.
March 18, 2016
A team created a prototype machine learning vulnerability scanner that can think like a human in order to perform automated penetration testing.
August 14, 2015
News roundup: Government email security got pummeled this week with news of hacks, breaches, unlabeled classified data and spying. Plus: Hacking a Corvette via text; Android sandbox bypass flaw; Oracle CSO blogs against reverse-engineering.
July 24, 2015
News roundup: A wireless car hack demonstration has pushed vehicle security legislation and DMCA exemptions into the spotlight, and prompted a manufacturer recall. Plus: Hacking Team update; DHS email issues; and smartwatches vulnerable to attack.
Security Testing and Ethical Hacking Get Started
Bring yourself up to speed with our introductory content
Bug-finding programs are valuable to enterprises, but they require a lot of planning and effort to be effective. Sean Martin looks at what goes into taking a bug bounty program public. Continue Reading
In this excerpt of Automated Security Analysis of Android and iOS Applications with Mobile Security Framework, authors Ajin Abraham and Henry Dalziel discuss mobile application penetration testing. Continue Reading
Information security assessments can be effective for identifying and fixing issues in your enterprise's policies. Expert Kevin Beaver explains the key components of the process. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Security Testing and Ethical Hacking Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Apple has started to offer bug bounties to researchers who find vulnerabilities in iOS. Expert Michael Cobb compares Apple's program to that of other companies. Continue Reading
Mass scanning of the internet can reveal how pervasive a vulnerability is. Expert Michael Cobb explains how these scans work and what the arguments for and against them are. Continue Reading
Before starting cloud penetration testing, there a few things to keep in mind. Expert Frank Siemons discusses limitations and techniques for pen testing cloud platforms. Continue Reading
Manage Security Testing and Ethical Hacking
Learn to apply best practices and optimize your operations.
The founder and CEO of Secure Ideas tells Marcus Ranum about his inner journey, from systems administrator at a friend's startup to ethical hacker for hire. Continue Reading
Traditional security testing is always recommended, but what about cyberwar games? Expert Mike O. Villegas discusses the best ways to test a security program. Continue Reading
Data shows that more companies are moving away from crowdsourcing and adopting invitation-only awards programs. Do higher-quality submissions result? Continue Reading
Problem Solve Security Testing and Ethical Hacking Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Bug bounty programs are a cool idea and often work, so why haven't they taken off for non-tech companies? Continue Reading
In this excerpt of Hacking with Kali: Practical Penetration Testing Techniques, authors James Broad and Andrew Bindner outline the five phases of the penetration testing lifecycle. Continue Reading
Adopting cloud-based applications can be a security headache. Michael Cobb explains how to perform tests that validate cloud app security. Continue Reading