Home Security Page 5

Security

To help you stay up to date with developments in web security, Packt Hub provides news and expert insights. We work with thought leaders to bring you the best advice about topics like malware analysis and penetration testing.

Social-Engineer Toolkit

0
(For more resources related to this topic, see here.) Social engineering is an act of manipulating people to perform actions that they don't intend to...
Teenage Hacker Girl Attacks Corporate Servers in Dark, Typing on Red Lit Laptop Keyboard. Room is Dark

Twitter memes are being used to hide malware

0
Last week, a group of security researchers reported that they have found a new malware that takes its instructions from code hidden in memes...

Approaching a Penetration Test Using Metasploit

0
"In God I trust, all others I pen-test" - Binoj Koshy, cyber security expert In this article by Nipun Jaswal, authors of Mastering Metasploit, Second Edition, we...

Open Source Intelligence

0
This article is written by Douglas Berdeaux, the author of Penetration Testing with Perl. Open source intelligence (OSINT) refers to intelligence gathering from open...

Encode your password with Spring Security 3

0
This article by Peter Mularien is an excerpt from the book Spring Security 3. In this article, we will: Examine different methods of configuring password encoding Understand...
Intel Headquarters

“Intel ME has a Manufacturing Mode vulnerability, and even giant manufacturers like Apple are...

0
Yesterday, a group of European information security researchers announced that they have discovered a vulnerability in Intel’s Management Engine (Intel ME) INTEL-SA-00086. They say...
Network security concept vulnerability Kali Linux

Why secure web-based applications with Kali Linux?

0
The security of web-based applications is of critical importance. The strength of an application is about more than the collection of features it provides....
The best penetration testing tools for ethical hackers

Top 5 penetration testing tools for ethical hackers

0
Software systems are vulnerable. That's down to a range of things, from the constant changes our software systems undergo, to the extent of the...
Pentest tool in focus: Metasploit

Pentest tool in focus: Metasploit

0
Security over the web is of the highest priority these days as most of our transactions and storage takes place on the web. Our...
Day Against DRM is back

Metasploit 5.0 released!

0
Last week, the Metasploit team announced the release of its fifth version, Metasploit 5.0. This latest update introduces multiple new features including Metasploit’s new...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews