Johnson is an experienced security consultant specialized in conducting security assessments such as web/network/thick-client/mobile penetration testing as well as exploiting human weakness. He enjoys sports, robotics and anything related to technology in his free time. He holds the following certifications: (1) GIAC Penetration Tester (GPEN), (2) Offensive Security Certified Professional
Get inside the mind of a hacker in this article as we explore what spurs hackers to do what they do. As we uncover what drives a hacker’s behavior, we learn about the abundant opportunities available for hacks today, including using hacking for good.
The following article covers how a DDoS attack happens, the various types of DDoS attacks, the ways in which they are dangerous, and why it is of utmost importance for businesses to pre-empt and secure themselves from being a victim.
No organization is too small to be targeted. All an attacker needs is one entry point to find a way into something bigger. So how can small businesses use a penetration test strategically to fit their limited budget?
A quick penetration testing tutorial that provides a framework for security professionals to test the security of their Android applications.
The meeting between United States President Donald Trump with North Korean Leader Kim Jong Un during the June 12 summit in the garden city of Singapore was a historic moment in the field of international relations. Despite the eyes of the world being glued to this key positive checkpoint in the US-DPRK relationship, the media was spinning up another story
What is a mechanic without his tools? Probably nothing much. Similarly, tools enable a penetration tester to perform repetitive tasks faster in a more timely manner, achieving the objective in the quickest time without increasing the time spent or manpower to complete. That is why we rejoice whenever there are new tools in the market to assist us in our