• New hacking technique exploits common programming error

    Researchers at Watchfire Inc. say they discovered a new technique that exploits a common dangling pointer error.

    searchsecurity20,930 pointsBadges:
  • Top 5 Hacker Tools: Google hacker, password cracker, WLAN detector

    Read about five must-have hacker tools: WikTo, a Web scanner and Google hacking tool; Paros Proxy, a Web application manipulation proxy; Cain and Abel, a password sniffer/cracker; Winfingerprint, a Windows configuration harvester; and Wellenreiter, a passive WLAN detector. Get a feel for their...

    searchsecurity20,930 pointsBadges:
  • How Windows servers get hacked

    Server hacking usually isn't as complex as it sounds. Knowing how easily an attacker can hack into your system can provide you with the tools to protect your servers ahead of time.

    Kevin Beaver16,955 pointsBadges:
  • Use Russian hackers to demand better security

    The hijack of 1.2 billion passwords got the world's attention this week. CIOs struggling to enforce security should take advantage of it, says one expert. Also in Searchlight: Walgreens CFO is replaced and its CIO takes on two IT shops.

    Fran Sales765 pointsBadges:
  • Hacking For Dummies: Chapter 7 — Passwords

    In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks.

    ITKE345,070 pointsBadges:
  • How to avoid brand hacking and ensure enterprise social media security

    Enterprise social media has revolutionized how businesses communicate with consumers. However, it has also made brand hacking an even larger concern.

    searchsecurity20,930 pointsBadges:
  • Web application hacking: Inside the mind of an attacker

    Want to prevent your Web application from being hacked? Then you need to think like an attacker. Kevin Beaver helps you change your mindset so you start to think about how people can misuse your application.

    Kevin Beaver16,955 pointsBadges:
  • Prevent hacking in your enterprise with these nine easy steps

    There are no foolproof ways to completely stop hacking in an enterprise, but follow these proven and common sense methods to reduce your risk.

    Kevin Beaver16,955 pointsBadges:
  • Book Review: The Art of Deception — Controlling the Human Element of Security

    Infamous hacker Kevin Mitnick demonstrates how "social engineers" acquire internal phone numbers, passwords and learn the company lingo to gain access to company networks and defeat complex security measures.

    SearchWinIT2,435 pointsBadges:
  • Opinion: ‘How to Repel a Hack Attack’

    Opinion: 'How to Repel a Hack Attack'

    ITKE345,070 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.