Home Security


To help you stay up to date with developments in web security, Packt Hub provides news and expert insights. We work with thought leaders to bring you the best advice about topics like malware analysis and penetration testing.

Pentest tool in focus: Metasploit

Security in 2017: What’s new and what’s not

Security has been a problem for web developers since before the Internet existed. By this, I mean network security was a problem before the...

How DevOps can improve software security

The term “security” often evokes negative feelings among software developers because it is associated with additional programming effort, uncertainty and roadblocks to fast development...

Essential skills for penetration testing

Cybercriminals are continally developing new and more sophisticated ways to exploit software vulnerabilities, making it increasingly difficult to defend our systems. Today, then, we need...

Why do so many companies fail to take cyber security seriously?

Consider this: in the past year cyber thieves have stolen $81m from the central bank of Bangladesh, derailed Verizon's $4.8 billion takeover of Yahoo,...

How to take a business-centric approach to security

Today’s enterprise is effectively borderless, because customers and suppliers transact from anywhere in the world, and previously siloed systems are converging on the core...

What Blockchain Means for Security

It is estimated that hacks and flaws in security have cost the US over $445B every year. It is clear at this point that...

Preventing Remote File Includes Attack on your Joomla Websites

PHP is an open-source server-side scripting language. It is the basis of many web applications. It works very nicely with database platforms such as...

Preventing SQL Injection Attacks on your Joomla Websites

Introduction Mark Twain once said, "There are only two certainties in life-death and taxes." Even in web security there are two certainties: It's not "if...

Telecommunications and Network Security Concepts for CISSP Exam

Transport layer The transport layer in the TCP/IP model does two things: it packages the data given out by applications to a format that is...

Public Key Infrastructure (PKI) and other Concepts in Cryptography for CISSP Exam

Public key infrastructure Public Key Infrastructure (PKI) is a framework that enables integration of various services that are related to cryptography. The aim of PKI is...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux