Do you know the latest in test attacks and testing techniques to become a cyber security test warrior? Becoming one is probably not for everyone, but the need is real, continues to grow, and offers a career opportunity for those brave enough to take the challenge.
Kiran Karnad, a contributor to the Google Hacking Database, tells us what the database is, how it was started, and how to utilize it to its fullest potential—just like black-hat hackers. Learn why this tool is an invaluable resource for helping protect your software from evil.
In this interview, Erik Costlow reveals some of the ways that today's hackers are using mobile apps to steal information not just from business, but also directly from mobile device users themselves. Erik also shares with us how device security should never be taken for granted by developers.
Thirty-year system software engineer and testing consultant Jon Hagar details the challenges that embedded software testing poses. Learn how risks should feed attacks, especially when maintaining the safety of devices like pacemakers and braking systems.