Licensed to hack: Cracking open the corporate world

By   ISBuzz Team
Writer , Information Security Buzz | Jun 04, 2013 05:49 am PST

This is the first of a two-part series on the techniques and tradecraft of ethical hackers. The second part will appear later this week.

All day. Every day. Anyone and anything connected to the net is under attack.

The standard defences, such as antivirus programs, firewalls, spam filters and intrusion detectors will stop most of those attacks reaching their target – be that a person, a computer or a database. Now and then an attack does get through but, if the target is you, the chances are you will spot the fake emails when they land in your inbox.


Recent Posts