Security Testing and Ethical Hacking News
March 18, 2016
A team created a prototype machine learning vulnerability scanner that can think like a human in order to perform automated penetration testing.
August 14, 2015
News roundup: Government email security got pummeled this week with news of hacks, breaches, unlabeled classified data and spying. Plus: Hacking a Corvette via text; Android sandbox bypass flaw; Oracle CSO blogs against reverse-engineering.
July 24, 2015
News roundup: A wireless car hack demonstration has pushed vehicle security legislation and DMCA exemptions into the spotlight, and prompted a manufacturer recall. Plus: Hacking Team update; DHS email issues; and smartwatches vulnerable to attack.
July 17, 2015
News roundup: Are the tides turning on mobile app safety? One white hat hacker's attempt to reverse-engineer the Subway app offers surprising results. Plus: CloudFlare Transparency Report; another call to eliminate RC4; Black Hat attendant survey.
Security Testing and Ethical Hacking Get Started
Bring yourself up to speed with our introductory content
Information security assessments can be effective for identifying and fixing issues in your enterprise's policies. Expert Kevin Beaver explains the key components of the process. Continue Reading
A honeypot is a computer system that is set up to act as a decoy to lure cyberattacks and to detect, deflect, or study attempts to gain unauthorized access to information systems. Continue Reading
Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage. The technology uses decoys to misdirect the attacker and delay or prevent him from going deeper ... Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Security Testing and Ethical Hacking Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Mass scanning of the internet can reveal how pervasive a vulnerability is. Expert Michael Cobb explains how these scans work and what the arguments for and against them are. Continue Reading
Before starting cloud penetration testing, there a few things to keep in mind. Expert Frank Siemons discusses limitations and techniques for pen testing cloud platforms. Continue Reading
Deception techniques aren't new to security strategies, but they could be on the rise. Is it really necessary for enterprises to hack back? Expert Kevin Beaver examines. Continue Reading
Manage Security Testing and Ethical Hacking
Learn to apply best practices and optimize your operations.
Traditional security testing is always recommended, but what about cyberwar games? Expert Mike O. Villegas discusses the best ways to test a security program. Continue Reading
Data shows that more companies are moving away from crowdsourcing and adopting invitation-only awards programs. Do higher-quality submissions result? Continue Reading
The vulnerability disclosure debate rages on: Enterprises should know they are at risk, but vendors need time to patch flaws. Which side should prevail? Expert Michael Cobb discusses. Continue Reading
Problem Solve Security Testing and Ethical Hacking Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Bug bounty programs are a cool idea and often work, so why haven't they taken off for non-tech companies? Continue Reading
In this excerpt of Hacking with Kali: Practical Penetration Testing Techniques, authors James Broad and Andrew Bindner outline the five phases of the penetration testing lifecycle. Continue Reading
Adopting cloud-based applications can be a security headache. Michael Cobb explains how to perform tests that validate cloud app security. Continue Reading