background preloader

Ethical Hacking Resources

Facebook Twitter

This is a collection of resources related to ethics behind hacking (please note that some are secured access articles, and they require an appropriate login). How can ethical hacking be used to build stronger security boundaries for companies?

Are bug bounties an useful way to find technical security flaws? Would secure and regulated penetration tests be a safer bet? How can companies protect against social engineering, where internal staff might be coerced into divulging sensitive information? The different collection of articles here aim to look deeper into these questions. The Effectiveness of Bug Bounty Programs. Why Apple Will Pay Hackers Thousands of Dollars. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Spirent Blogs - DoD Bug Bounty ProgramâA Formative Approach for Security Audits? Old Dominion University Libraries - Remote login. Off-campus Library Resource Login MIDAS Account access Current ODU faculty, staff and students should click the button below to login with your MIDAS account.

Old Dominion University Libraries - Remote login

Online resources available through the ODU Library web site are limited to currently registered students, staff, and faculty of Old Dominion University due to licensing restrictions. All resources have usage guidelines and restrictions. Old Dominion University Libraries - Remote login. Off-campus Library Resource Login MIDAS Account access Current ODU faculty, staff and students should click the button below to login with your MIDAS account.

Old Dominion University Libraries - Remote login

Online resources available through the ODU Library web site are limited to currently registered students, staff, and faculty of Old Dominion University due to licensing restrictions. Is the bug bounty program concept flawed? When it comes to reporting technical vulnerabilities to the parties involved, most security researchers and hackers know that they need to proceed with caution.

Is the bug bounty program concept flawed?

Logan Lamb learned that lesson the hard way when he found security weaknesses in home alarm systems and then felt "pressured" by big-name home security vendors to keep a lid on his findings at Black Hat USA 2014 last August. But Black Hat is also the place where vendors like to invite trouble. Mobile credit card processor Square announced its security bug bounty program, run by HackerOne, in 2014. Microsoft launched its bug bounty program at the Las Vegas convention in 2013.

Old Dominion University Libraries - Remote login. Off-campus Library Resource Login MIDAS Account access Current ODU faculty, staff and students should click the button below to login with your MIDAS account.

Old Dominion University Libraries - Remote login

Online resources available through the ODU Library web site are limited to currently registered students, staff, and faculty of Old Dominion University due to licensing restrictions.