HOME

TheInfoList



OR:

Packet Storm Security is an
information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
website A website (also written as a web site) is a collection of web pages and related content that is identified by a common domain name and published on at least one web server. Examples of notable websites are Google Search, Google, Facebook, Amaz ...
offering current and historical
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
tools,
exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: *Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploitat ...
s, and security advisories. It is operated by a group of security enthusiasts that publish new security information and offer tools for educational and testing purposes.


Overview

The site was originally created by Ken Williams who sold it in 1999 to Kroll O'Gara and just over a year later, it was given back to the security community. While at Kroll O'Gara, Packet Storm awarded
Mixter Mixter is a computer security specialist. Mixter first made the transition out of the computer underground into large-scale public awareness, in 2000, at which time newspapers and magazines worldwide mentioned a link to massively destructive and e ...
$10,000 in a whitepaper contest dedicated to the mitigation of distributed denial of service attacks. Today, they offer a suite of consulting services and the site is referenced in hundreds of books. In 2013, Packet Storm launched a bug bounty program to buy working exploits that would be given back to the community for their own testing purposes. Later that year, they worked with a security researcher to help expose a large scale
shadow profile Shadow profile describes the situation when users' or non-users' information is collected without their consent. One of the most discussed cases of shadow profiling is on Facebook, which is reported to collect information on people which they did ...
issue with the popular Internet site Facebook. After Facebook claimed that only 6 million people were affected, additional testing by Packet Storm exposed that the numbers were not accurately reported.


References


External links

*{{official website, https://packetstormsecurity.com/ Computer security organizations Computer network security Internet properties established in 1998