• Are offensive hacking courses ethical? Debating the ethics of hacking

    News roundup: Colleges across the country are offering courses in offensive hacking, but are they ethical? Plus: Why the first 'online murder' may happen in 2014; Palo Alto and NSS Labs make up; numerous Android security issues surface.

    SharonShea75 pointsBadges:
  • Hacking for Dummies: Ethical hacking to expose security vulnerabilities

    "Hacking for Dummies," by Kevin Beaver gives detailed information about how to ethically hack into your systems to expose security vulnerabilities. In this interview with SearchSoftwareQuality.com, Beaver discusses the book, methods of security testing, how to get started and advice for security...

    ITKE350,195 pointsBadges:
  • Hacking forensics: Windows command-line tools for the modern era

    It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised.

    ITKE350,195 pointsBadges:
  • Screencasts: On-screen demonstrations of security tools

    SearchSecurity.com's screencast series allows top experts to demonstrate popular information security tools and techniques, including UTM configuration, Google hacking, and Snort IDS use.

    ITKE350,195 pointsBadges:
  • Ira Winker: Does recent hacktivism news justify enterprise hacktivism defense?

    Information security expert Ira Winkler discusses hacktivism news, in the wake of Anonymous and LulzSec, and justifies why enterprise hacktivism defense isn't needed.

    ITKE350,195 pointsBadges:
  • How Windows servers get hacked

    Server hacking usually isn't as complex as it sounds. Knowing how easily an attacker can hack into your system can provide you with the tools to protect your servers ahead of time.

    Kevin Beaver17,365 pointsBadges:
  • Storage area network (SAN) hacking

    SAN hacking translates into network insecurity and lost or corrupted data. Get to know SAN threats as outlined in this excerpt from "Securing Storage: A Practical Guide to SAN and NAS Security."

    ITKE350,195 pointsBadges:
  • New hacking technique exploits common programming error

    Researchers at Watchfire Inc. say they discovered a new technique that exploits a common dangling pointer error.

    searchsecurity21,090 pointsBadges:
  • Top 5 Hacker Tools: Google hacker, password cracker, WLAN detector

    Read about five must-have hacker tools: WikTo, a Web scanner and Google hacking tool; Paros Proxy, a Web application manipulation proxy; Cain and Abel, a password sniffer/cracker; Winfingerprint, a Windows configuration harvester; and Wellenreiter, a passive WLAN detector. Get a feel for their...

    searchsecurity21,090 pointsBadges:
  • Use Russian hackers to demand better security

    The hijack of 1.2 billion passwords got the world's attention this week. CIOs struggling to enforce security should take advantage of it, says one expert. Also in Searchlight: Walgreens CFO is replaced and its CIO takes on two IT shops.

    Fran Sales960 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.