Master the basics of exploit development, including stack-based buffer overflows, format string attacks, and ROP, in our comprehensive guide.
Wi-fi Hacking: Vulnerabilities, and Techniques
Master wireless network vulnerabilities, Wi-Fi hacking techniques like sniffing, cracking WEP/WPA/WPA2, and learn how to secure your network.
Web App Vulnerabilities Over Buffer Overflows
This should be an eye opener to many. In September Mitre reported that web application vulnerabilities are claiming the top three spots on their CVE request list, beating out Buffer Overflows.
Security Alert: New Vulnerabilities for Business This Year
One of the new weak spots – virtual private networks (VPN) – is a hot button security issue for most companies these days. A VPN lets companies use the Internet as a secure pathway into their existing network. If a VPN user has an always-on Internet connection like cable or DSL, it complicates things; this system is connected to the Internet as if it is unprotected (no firewall) and becomes an easy target. You can protect your network with a product such as CommandView Firewall from Elron, which rates supreme, thanks to its straightforward interface and high level of sophistication. For companies with larger networks, products such as Check Point Software Technologies Firewall-1 at Check Point may be the answer. Also check out Firewall Vendors under the Products/Firewalls area for a list of firewall vendors.