Ethical Hacking
Latest about Ethical Hacking

Does cyber security’s public image need a makeover?
By Charlie Metcalfe published
In-depth A growing number of ethical hackers want the media to change the way it talks about the industry

Google launches new bug bounty platform
By Sabina Weston published
News Vulnerability hunters will be able to improve their skills through the newly launched Bug Hunter University

Microsoft awarded $13.6 million in bug bounties over the last 12 months
By Sabina Weston published
News Over 340 security researchers from 58 countries reported a total of 1,261 valid vulnerabilities between 2020-2021

IT Pro 20/20: Does cyber security's public image need a makeover?
By Dale Walker published
IT Pro 20/20 Issue 18 of IT Pro 20/20 looks at recent efforts to retire the 'hacker' stereotype, and how the threat landscape has changed over the past 20 years

The IT Pro Podcast: Why is it so hard to convict hackers?
By IT Pro published
IT Pro Podcast Catching cyber criminals is hard enough - but putting them behind bars is even more challenging

Apple's AirTag tracker has already been hacked
By Mike Brassfield published
News An IT security researcher redirected the device’s finding feature to his own website

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
By Rene Millman published
News This move allows greater research and reporting of bugs to Pentagon

Security researchers take control of a Tesla via drone
By Mike Brassfield published
News Cyber security researchers found a way to unlock the car doors with a Wi-Fi dongle
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.