by John Verry | Mar 3, 2022 | Ethical Hacking
Reading Time: 3 minutes
The rapid growth of APIs has led to significant security risks. Unless you have been marooned on an uncharted coral atoll for the last five years, you realize that the term application programming...
by Richard Barrus | May 16, 2017 | Ethical Hacking
Reading Time: 2 minutes
One would think that most CISOs and IT security teams are at least cautiously optimistic about their ability to respond to cyber threats. But if the opinions of professional “white hat” hackers are any indication, the reality is that...
by Richard Barrus | Oct 18, 2016 | Ethical Hacking, Penetration Testing
Reading Time: 2 minutes
Define: Internet of Things (IoT) The internet of things (IoT) is the internetworking of physical devices, vehicles, buildings, and other items; embedded with electronics, software, sensors, actuators, and network connectivity that...
by Richard Barrus | Jun 21, 2016 | Ethical Hacking, Penetration Testing
Reading Time: 3 minutes
In Part 1 of this post, I provided an overview of mobile app attack vectors and penetration testing approaches. In Part 2, I covered tools, techniques and issues related to the two types of mobile applications: browser-based and...
by Mike Gargiullo | Jun 14, 2016 | Ethical Hacking, Penetration Testing
Reading Time: 3 minutes
About 2 weeks ago I had an in-depth conversation with a client after performing a low-intensity penetration test. We offer a low-cost penetration test option that we call a “Validate” level engagement. Basically, a Validate level...
by Richard Barrus | Jun 1, 2016 | Ethical Hacking, Penetration Testing
Reading Time: 5 minutes
In Part 1 of this post, I provided an overview of mobile app attack vectors and penetration testing approaches. In Part 2, I covered tools, techniques, and issues related to the two types of mobile applications: browser-based and...