hacking

Articles

Cyber Security Test Warriors Cyber Security Test Warriors: Where Might You Take Your Career?

Do you know the latest in test attacks and testing techniques to become a cyber security test warrior? Becoming one is probably not for everyone, but the need is real, continues to grow, and offers a career opportunity for those brave enough to take the challenge.

Jon Hagar's picture Jon Hagar

Interviews

Get to Know Google's Hacking Database: An Interview with Kiran Karnad
Podcast

Kiran Karnad, a contributor to the Google Hacking Database, tells us what the database is, how it was started, and how to utilize it to its fullest potential—just like black-hat hackers. Learn why this tool is an invaluable resource for helping protect your software from evil.

Noel Wurst's picture Noel Wurst
Enhancing Mobile Data Security: An Interview with Erik Costlow

In this interview, Erik Costlow reveals some of the ways that today's hackers are using mobile apps to steal information not just from business, but also directly from mobile device users themselves. Erik also shares with us how device security should never be taken for granted by developers.

Noel Wurst's picture Noel Wurst
How to Break Embedded Software: An Interview with Jon Hagar
Video

Thirty-year system software engineer and testing consultant Jon Hagar details the challenges that embedded software testing poses. Learn how risks should feed attacks, especially when maintaining the safety of devices like pacemakers and braking systems.

Noel Wurst's picture Noel Wurst

StickyMinds is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.