Ethical hacking might sound like a contradiction in terms, but it’s actually an important tool when it comes to an organization's cyber security. An ethical hacker, also known as a white hat hacker, ...
So-called zero-day exploits—hacking techniques that take advantage of secret software flaws—were once the calling card of only the most sophisticated hackers. But today, the global map of zero-day ...
Hacking: The Art of Exploitation, 2nd Edition (Jon Erickson, No Starch Press, 2008) is an intense, thorough and extremely well written book that can take you from basic hacking concepts to building ...
As you probably know, Grossman has been listing the Top Ten Hacks since 2006, focusing on new and creative web attacks. The number and complexity of attacks increase every year. White Hat Security ...
A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting. A Web hack that can ...
Cybersecurity is a huge industry, but it's tough to land even an entry-level job. If you want to ride the learning curve and work toward your worst tech job, the All-in-One Super-Sized Ethical Hacking ...