Read more about penetration testing
Bookmark and Share
  • Training: The Art of Exploiting Injection Flaws

    03.09.2013

    HITBSecConf 2013 Malaysia will host the widely acclaimed course The Art of exploiting Injection Flaws in Kuala Lumpur on 14 and 15 October 2013.

  • Most security managers don't trust their apps

    02.09.2013

    Application vulnerabilities are a major factor in the cybercrime game.

  • The current state of application security

    28.08.2013

    New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing organizations.

  • Working as an ethical hacker

    05.08.2013

    The term "ethical hacker" as it is used today is, if you ask me, somewhat imprecise.

  • Cybercriminals are doing a better job than the companies they target

    05.08.2013

    What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their indictment against a mostly Russian—one American co-conspirator was also named—gang of cybercriminals who are alleged to have snatched over 160 million credit card numbers resulting in more than $300 million in losses over seven years.




Spotlight

Successful strategies to avoid frequent password changes

Posted on 19 August 2014.  |  After a widespread, nonspecific data breach, the conventional wisdom is that people should change all their passwords. But, there’s a better way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Aug 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //