Former hacker warns against password reuse
Kyle Milliken is back from jail, and he has some advice for you: Do. Not. Reuse. Your. Passwords. Continue reading Former hacker warns against password reuse
Collaborate Disseminate
Kyle Milliken is back from jail, and he has some advice for you: Do. Not. Reuse. Your. Passwords. Continue reading Former hacker warns against password reuse
Vulnerability experts Michiel Prins and Greg Ose discuss the 15 most common vulnerability types. Continue reading Exploring the Top 15 Most Common Vulnerabilities with HackerOne and GitHub
Our company has online app that requires to create a business account. Yesterday some suspicious accounts were made and our system automatically blocked the account creators and ip addresses.
And today we have received an em… Continue reading White hat hacker asks for account to do penetration tests
I need to perform white box testing of android as well as server code.Please let us know which is the best plugin to find vulnerability in the code.
Thanks!
He is also the all-time top-ranked hacker on HackerOne’s leaderboard, out of more than 330,000 hackers competing for the top spot. Continue reading Teen Becomes First to Earn $1M in Bug Bounties with HackerOne
As I looked over the schedule for Check Point’s CPX 360 conference, one keynote session jumped out at me, not because of the topic but because of the name of the presenter: Freaky Clown, in all caps. “You’ll want to go to that one,” someone from Check… Continue reading Trust Nothing if You Want Real Security
I am a security member of a small company which recently got contacted by someone claiming to be a Hackenproof member.
They were reporting on our website being indexed by googlebot (metadata, thin page content, anchor text is… Continue reading How to proceed with a white-hat hacker claiming a vulnerability?
I am a security member of a small company which recently got contacted by someone claiming to be a Hackenproof member.
They were reporting on our website being indexed by googlebot (metadata, thin page content, anchor text issues) and an X… Continue reading How to proceed with a white-hat hacker claiming a vulnerability?
SaaS security solutions such as “WhiteHat Sentinal” and “Fortify on Demand”
are getting popular now a days. Methodologies of both describe them involving manual verification. Does this qualify the Application security asses… Continue reading Does application security assessments done using SaaS solutions (WhiteHat Sentinal and Fortify on Demand) count as penetration tests?
I’m working on a thesis about the hacker community.
When a 0day is published, how can an administrator secure his application/website between the time the 0day is published and the patch is developed ?
Moreover, most of the… Continue reading How can an administrator secure against a 0day before patches are available?