Trojans
One of the older and potentially widely misunderstood forms of malware is the Trojan. Simply put, a Trojan is a
Read moreFor an overview of the process, let’s look at the steps of ethical hacking to see where foot-printing fits in
Read moreA hacking methodology refers to the step-by-step approach used by an aggressor to attack a target such as a computer
Read moreA pen test is the next logical step beyond ethical hacking. Although ethical hacking sometimes occurs without a formal set
Read moreEthical hackers engage in sanctioned hacking—that is, hacking with permission from the system’s owner. In the world of ethical hacking,
Read moreThe difference between an ethical hacker and a hacker is something that can easily get you into an argument. Just
Read moreAttackers have constantly sought to “up” their game with new tactics and strategies to include new types of malware such
Read more