It's a widely known fact that Google Search is a valuable tool for attackers looking for a way into organizationsí information systems.
Authors: Gavin Watson, Andrew Mason, and Richard Ackroyd Pages: 390 Publisher: Syngress ISBN: 0124201245 Introduction We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets - regularly take advantage of this fact to gain a foothold into computer systems and networks.
Core Security announced the latest version of the Core Attack Intelligence Platform, which consolidates, prioritizes and validates the overwhelming quantity of vulnerabilities identified by scanners.
Author: Georgia Weidman Pages: 528 Publisher: No Starch Press ISBN: 1593275641 Introduction There are many people out there fascinated by the idea of penetration testing, but they believe they could never learn to do it, or haven't got a clue on where to start.
Freelance security researcher Claes Spett has made available a tool he dubbed "PDF Exploit Generator," which allows penetration testers - but also malicious attackers - to create a booby-trapped PDF in a matter of minutes.