Please turn on your JavaScript for this page to function normally.
The story of Pwnie Express

Pwnie Express provides security testing solutions for today’s distributed enterprise and their hard-to-reach branch offices. We have met them at numerous conferences and …

Penetration testing device that fits in your pocket

Pwnie Express updated the Pwn Phone, a phone that doubles as a powerful penetration testing device making it easy to evaluate wired, wireless and Bluetooth networks. Pwn …

A hybrid approach to web app security assessment

High-Tech Bridge is introducing its hybrid web application security assessment SaaS, ImmuniWeb for the first time ever to visitors at Infosecurity Europe 2014. The service, …

Professional Penetration Testing, Second Edition

Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …

University of Maryland sets concrete cybersecurity goals in wake of data breach

The individuals affected in the recent data breach at the University of Maryland will be getting five instead of one year of free credit monitoring, the University’s …

New free online software security training courses

The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization working to increase trust in technology products and services through the advancement …

Penetration testing: Accurate or abused?

According to a recent Ponemon study, since 2010 cybercrime costs have climbed 78% and the time required to recover from a breach has increased 130%. On average, U.S. …

Bypassing security scanners by changing the system language

A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that a computer system can be set up to …

How important is penetration testing?

With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and …

Training: The Art of Exploiting Injection Flaws

HITBSecConf 2013 Malaysia will host the widely acclaimed course The Art of exploiting Injection Flaws in Kuala Lumpur on 14 and 15 October 2013. This hands-on session will …

Most security managers don’t trust their apps

Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …

The current state of application security

New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing …

Don't miss

Cybersecurity news