Please turn on your JavaScript for this page to function normally.
The importance of ethical hacking

The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud …

Nessus 5.0.1 vulnerability scanner released

Tenable release of Nessus 5.0.1, a vulnerability and configuration assessment solution for enterprises and security professionals. This release improves the stability on all …

0-day in Backtrack Linux found, patched

A zero-day vulnerability affecting the last version of Backtrack Linux has been spotted by a student during an Ethical Hacking class organized by the InfoSec Institute. The …

Maltego 3.1.1 Community Edition released

Maltego is a platform developed to deliver a clear threat picture to the environment that an organization owns and operates. The unique perspective that Maltego offers to both …

Penetration testing tips, tricks and unusual situations

Raul Siles is a senior security analyst with more than 10 years of expertise performing advanced security services. He is a SANS Institute author and instructor of penetration …

Metasploit: The Penetration Tester’s Guide

Metasploit Framework (MF), the open source tool for launching exploits against remote machines, is a well-loved instrument that allows penetration testers to automate routine …

Multifunction printer hacking

A great number of multifunction printers of have the ability to integrate within a corporation’s business environment and connect to its email systems, its file systems, …

A new security strategy for Sony

2011 was a tough year for Sony. Having been attacked over 20 times by hacktivists going after its websites, the PlayStation Network, its customers’ and company …

ElcomSoft adds AMD Radeon 7000 Series support

ElcomSoft updated its Phone Password Breaker and Wireless Security Auditor with OpenCL support, adding support for the latest AMD Radeon Graphics and ensuring universal …

Researchers compromise e-voting system

A group of researchers from the University of Michigan has recently attacked and managed to compromise the Washington, DC Digital Vote by Mail Internet voting system, proving …

Metasploit identifies IPv6 security risks

Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …

Acunetix Web Vulnerability Scanner 8 released

Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking experience through its new ability to lock hackers out by integrating scan results into …

Don't miss

Cybersecurity news