Problem solve Get help with specific problems with your technologies, process and projects.

Screencast: Google hacking, infosec style

In this exclusive screencast step-by-step demo, Tom Bowers explains how to ensure an organization's intellectual property doesn't fall into the wrong hands.

Can't see the screen?

Watch Tom Bowers' Google hacking demonstration in a larger window.
Search engines and tools are not only handy when it comes to finding something on the Web, but they can also help security professionals ensure an organization's intellectual property doesn't slip off the network and into the public domain.

In this step-by-step demonstration, contributor Tom Bowers demonstrates how some basic "Google hacking" methods can offer fascinating competitive intelligence for your enterprise.

About the author:
Tom Bowers, managing director of security think tank and industry analyst firm Security Constructs, holds the CISSP, PMP and Certified Ethical Hacker certifications, and is a well-known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. Bowers serves as the president of the 600-member Philadelphia chapter of Infragard, is a technical editor of Information Security magazine, and speaks regularly at events like Information Security Decisions.

Learn more about Google hacking:

This was last published in August 2007

Dig Deeper on Penetration testing, ethical hacking and vulnerability assessments

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.