Web Application Security
Pentesting attacks Jul 25 2012 12:00PM
ITlook (madziak12 vp pl)


- Zed Attack Proxy - see what it;s all about!
- Understand how A Wireless (802.11) Probe Request Based Attack works
- How to secure users from Phishing, Smishing & Social Media Attacks
- Cyber war... Is the digital apocalypse approaching?
- Original â??security through obscurity" viz. SCADA penetration testing

Find it now in FREE issue of PenTest magazine!
http://pentestmag.com/pentesting-attacks-pentest-free/
--
View this message in context: http://old.nabble.com/Pentesting-attacks-tp34209974p34209974.html
Sent from the Web App Security mailing list archive at Nabble.com.

This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now!
http://www.cenzic.com/2009HClaunch_Securityfocus
--------------------------------------

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus