Blog

Latest news around the world

08

Jun'16

How to Write a Secure Code in C/C++ Programming Languages

By Alfrick Opidi of www.legitblogger.com Secure coding in C/C++ programming languages is a big deal. The two languages, which are …

Read More

30

May'16

State of Application Security: Perception vs. Reality

    You can find  find all three versions of this graphic, along with the report here: https://www.arxan.com/resources/state-of-application-security/  

Read More

23

May'16

Anatomy of medical device attacks

You can find  find all three versions of this graphic, along with the report here: https://www.arxan.com/solutions/healthcare/application-protection-for-healthcare-and-medical-devices/

Read More

22

Mar'16

Front end optimization: almost everything your users care about

Prepare yourself for a simple question that will determine whether or not your website requires front end optimization: Does your …

Read More

10

Mar'16

WiFi Scanning Tools on Ubuntu 14.04

Dear PenTest Readers, Today we’ve got for you new article about WiFi Scanning Tools on Ubuntu 14.04 written by Majdi Chaouachi. …

Read More

29

Feb'16

(W28M00) Pre-course materials

Penetration Testing Using The “Kill Chain” Methodology Presented by: Rupert Edwards     This course is intended for a technically …

Read More

28

Feb'16

The “Kill Chain” methodology – interview with Rupert Edwards

Dear PenTest Readers, Today we’ve got for you another great interview. We spoke with Rupert Edwards about Linux and The …

Read More

22

Feb'16

The Hidden Dangers of Microsoft’s Task Scheduler

The Hidden Dangers of Microsoft’s Task Scheduler by Gilbert Oviedo Most Windows users run their computers on a daily basis …

Read More

15

Feb'16

Suricata tool is an open source network IDS- interview with Victor Julien

Dear Readers, today we present you an interview with Victor Julien who is one of the creators of Suricata tool- an open …

Read More

14

Feb'16

Ettercap and middle-attacks tutorial

We have published new article about Ettercap. You can find it here: https://pentestmag.com/article-fun-ettercap/ In the computer world, an attack is a …

Read More

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013