Are subscription-based penetration testing services beneficial?

Security Testing and Ethical Hacking

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Brief: Moore releases flaw-finding tool

    On the eve of Black Hat, Metasploit Project founder H.D. Moore has released a new tool for finding vulnerabilities in Internet Explorer ActiveX controls, and an updated version of the Metasploit Framework. 

  • Metasploit creator promises browser flaws galore

    This week in Security Blog Log: A researcher vows to expose a new browser flaw every day this month. Meanwhile, McAfee's blog marks a mournful malware milestone. 

  • Military students get lesson in cyberwarfare

    Students from the nation's most recognized military academies recently took part in a contest that not only tested their network defense skills, but also gave them a taste of real-world information security. 

  • Security Blog Log: Burning about Firefox recruitment

    This week, a security blogger frowns on an independent group's efforts to force IE users onto the Firefox bandwagon. Plus, an international fight over identification cards. 

  • Pen testing your VPN

    Your VPN is a vital gateway into your network for your company's road warriors, telecommuters and other remote users. Unfortunately, it's also a gateway for the less-than-scrupulous predators prowling the Internet for access to your network. This tip... 

  • Security Wire Weekly: Targeting the latest Microsoft flaws and a warning about Google

    This week's podcast details exploits targeting the latest Microsoft flaws, a hacking challenge that's raising eyebrows and a warning about Google that shouldn't be ignored. Listen on your PC or download to your favorite mobile device. 

  • Best practices for pen testing Web applications

    Performing a Web application penetration test can gauge how well your Web application can withstand an attack. In this tip, platform security expert Michael Cobb provides best practices for performing Web application pen test. 

  • Security Bytes: Mac patch falls short of expectations

    In other news, one hacker gains root access to a Mac while another shows how to compromise Microsoft Fingerprint Reader. 

  • Security Blog Log: Hacking for grades causes a stir

    A college exercise in hacking doesn't sit well with some bloggers. Meanwhile, a bear shows us a thing or two about security and Webroot loses its public voice. 

  • Protect your business from a Google hack

    Learn how to use advanced operators, special searching techniques offered by Google that enable advanced queries, to discover if your company's sensitive security information is exposed on the Internet before a black hat does. This tip offers a sampl...