Use Google To Spot Network Security Holes

  /     /     /  
Publicated : 22/11/2024   Category : security


Use Google To Spot Network Security Holes


The bad guys use search engines to seek out weak spots. Heres how to beat them to the punch.



10 Companies Driving Mobile Security (click image for larger view and for slideshow)
[The following is excerpted from Using Google To Find Vulnerabilities In Your IT Environment, a new report posted this week on Dark Readings
Vulnerability Management Tech Center
.]
The vast volumes of information available on the Internet are of great value to businesses--and to hackers. For years, hackers have been using Google and other search engines to identify vulnerable systems and sensitive data on publicly exposed networks. The practice, known as Google hacking, has seen a resurgence of late, providing new challenges for IT professionals striving to protect their companies from threats growing in number and sophistication.
Google hacking--a term used for penetration testing using any search engine--surged in popularity around 2004, when computer security expert Johnny Long first released his book
Google Hacking for Penetration Testers and the Google Hacking Database
(GHDB). The database was designed to serve as a repository for search terms, called Google-Dorks, that exposed sensitive information, vulnerabilities, passwords, and much more.
There recently has been an upswing in Google hacking, with a few factors playing a role in the practices growth. For one thing, the amount of data indexed and searchable by Google and other search engines has skyrocketed in the last few years. Simply put, this has given hackers much more to work with.
Read the rest of this article on
Dark Reading
.
InformationWeek is conducting a survey to determine the types of measures and policies IT is taking to ensure the security of the full range of mobile assets on cellular, Wi-Fi, and other wireless technologies. Upon completion of our survey, you will be eligible to enter a drawing to receive an 32-GB Apple iPod Touch. Take our
Mobile Security Survey
now. Survey ends March 16.

Last News

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Use Google To Spot Network Security Holes