Drop boxes attack corporate networks from within 
By Darren Pauli | Jun 18, 2013 | Comment Now 
Call forensics and don't cut the power.
 
Pen testing with single board computers  
By Darren Pauli | Nov 26, 2012 | Comment Now 
Lizardb0y talks do-it-yourself penetration testing with Raspberry Pi and Beagle Boards.
 
Penetration tester builds wardriving motorbike 
By Darren Pauli | Nov 26, 2012 | Comment Now 
Brings subtlety to trashing wireless networks.
 
Pen tester builds wifi war-bike  
By Darren Pauli | Nov 23, 2012 | Comment Now 
Motorbike kitted out with wifi kit, helmet display.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 633

Vote