Posts Tagged ‘ethical hacking’
Cybersecurity Certifications: What You Need for Your Field
Cybersecurity is a fast-moving, high-stakes field that comes with a dizzying array of certifications. From ethical hacking to cloud security, there’s a cert (or five) for nearly every specialty. But which ones are truly essential? Which are nice to have? And what does it actually take to get them? Whether you’re just breaking into the…
Read MoreUnderstanding Your Penetration Test Report
Part 3: What Should I Expect in a Penetration Test Report? A penetration test report is a comprehensive document that details the security assessment of your systems. You can expect it to include an executive summary, which provides a high-level overview of the findings for non-technical stakeholders, and a technical section that dives deep into…
Read MorePreparing Your Company for a Penetration Test
Part 2: The Most Asked Questions About Penetration Test Preparation How can I prepare my company for a penetration test? Properly preparing for a penetration test ensures that your business is ready for a thorough security assessment. Begin by defining what you are trying to achieve, such as identifying system vulnerabilities, assessing your security, or…
Read MoreSecurity for the SMB: Preventing a Business Nightmare
T-Mobile. Home Depot. Target. California State University. All are large organizations that fell victim to expensive data breaches because of a third-party vendor, nor are they alone in that list! For any small to medium-sized business (SMB), there are two very important points to be aware of: 1) Small companies are, in fact, targets. Whether they…
Read MoreEnterprise security posture extends to vendors as well
Massive security changes are taking place as the security buzz grows, especially in relation to giant corporations and their efforts to keep information protected. Huge public breaches are increasing public awareness about internet security and privacy, and as a result, many firms are implementing tighter enterprise security controls. Facebook and Google have both migrated from 1024-bits to 2048-bit encryption keys, while companies like Apple, Microsoft, Twitter, Myspace and Dropbox already have these in place.
Read MoreUS “hacktivist” Says Network Attack is AT&T’s Failure
Andrew Auernheimer, the US “hacktivist” who broke into the network of AT&T said that the attack was done to highlight security failings. Its reported that Andrew Auernheimer aka Weev and Daniel Spitler stole email addresses from 120,000 iPad owners by exploiting a bug in the way AT&T set up its network. Due to this, Auernheimer…
Read MoreAdvertising Botnet Steals Millions
A computer network generating millions of fake advert viewings has been discovered by British web analytics firm Spider.io. The network nicknamed “Chameleon” is made up of 120,000 home pc’s and costs advertisers around $6m per month. Spider.io reports that Chameleon simulated clicks on adverts on over 200 sites and said the botnet was responsible for up to nine…
Read More