hacking
|
Cyber Security Test Warriors: Where Might You Take Your Career? Do you know the latest in test attacks and testing techniques to become a cyber security test warrior? Becoming one is probably not for everyone, but the need is real, continues to grow, and offers a career opportunity for those brave enough to take the challenge.
|
|
|
Get to Know Google's Hacking Database: An Interview with Kiran Karnad
Podcast
Kiran Karnad, a contributor to the Google Hacking Database, tells us what the database is, how it was started, and how to utilize it to its fullest potential—just like black-hat hackers. Learn why this tool is an invaluable resource for helping protect your software from evil.
|
|
|
Enhancing Mobile Data Security: An Interview with Erik Costlow In this interview, Erik Costlow reveals some of the ways that today's hackers are using mobile apps to steal information not just from business, but also directly from mobile device users themselves. Erik also shares with us how device security should never be taken for granted by developers.
|
|
|
How to Break Embedded Software: An Interview with Jon Hagar
Video
Thirty-year system software engineer and testing consultant Jon Hagar details the challenges that embedded software testing poses. Learn how risks should feed attacks, especially when maintaining the safety of devices like pacemakers and braking systems.
|
|
Visit Our Other Communities
StickyMinds is a TechWell community.
Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.