1. Real Time Wired, Wireless, and Bluetooth Asset Discovery Pwn Pulse allows you to automatically discover both wired and wireless assets and helps security professionals locate rogue devices and...
The Pwnie Cowboy! In his first video appearance, the Pwnie Cowboy will remind you of how important it is to secure your remote locations, and how Pwnie Express can help you do just that.
Here at Pwnie, we want to know just how we're helping the industry. So we conducted a survey of you and your peers -- hundreds of IT security professionals last month. The survey found that 40.6...
Black Hat 2014 had a roundtable on “Medical Devices Roundtable: Is There a Doctor in the House? Security and Privacy in the Medical World”. Rapid 7’s Jay Radcliffe presented the major issues facing...
Congratulations to Eric Meyers of Corning, Inc. and Joe Burgos of Molina Healthcare, the winners of our Pwn Phone drawings at Black Hat and DEF CON! The Pwn Phone 2014 is a high-speed, lightweight LG...
The heart of any company is the headquarters. Organizations go to great lengths to protect this center of human and security activity, but like wearing a Kevlar vest to protect the vitals, securing...
Pwnie Express would like to announce the winner of our Pwn Phone 2014 Survey that closed at the end of July. Dan Fleischer of Illinois is the lucky winner! We look forward to hearing about how he's...
Episode 548: Project Eavesdrop This is the final recap of NPR’s Morning Edition on June 20th Here Steve Henn explains what NPR and he discovered during his series with Pwnie Express and what this...
Here's One Big Way Your Mobile Phone Could Be Open To Hackers This show provides a view into Pwnie Express’s Pwn Plug R2 and how much data can be gleaned off a mobile device. Automatically, mobile...
How Well Do Tech Companies Protect Your Data From Snooping? Steve Henn from NPR’s Planet Money and Dave Porcello, Founder of Pwnie Express assess what happens to your information online. They provide...
Note: Per our agreement with NPR, Pwnie Express is not disclosing any data collected during the research experiment with Steve Henn, but focusing it’s comments on providing education on the...
Note: Per our agreement with NPR, Pwnie Express is not disclosing any data collected during the research experiment with Steve Henn, but focusing it’s comments on providing education on the...
In the oft-repeated words of Bill Cheswick of Bell Labs, perimeter defenses like firewalls can serve as "a sort of crunchy shell around a soft, chewy center." Your datacenter may be secured like Fort...
With the ubiquity of WiFi devices, the ability to create a rogue access point (also known as an EvilAP) has never been more useful, or in the wrong hands, more dangerous. For a pentester, an EvilAP...
Penetration testers rely heavily on a challenging combination of open source and proprietary software. Most of these tools are available for free through various software repositories but who makes...
In this new white paper by Pwnie Express, we provide an overview of vulnerability assessment and penetration testing. We demonstrate why such measures are critical to the long-term health and success...
I want to explain my excitement about joining the Pwnie Express team and talk about what we are doing. I am excited to join Dave Porcello. For those of you who are new to Pwnie Express, Dave founded...
Today we're very proud to announce a new product, the Pwn Plug R2. This brand new release builds on the massive success of the Pwn Plug Elite, and brings with it a number of customer-requested...
The fine folks over at the Gentleman’s Hacker’s Club recently dropped a fun tidbit about the GoDaddy URL Shortener leaking NTLM creds over the Internet. It's worth mentioning that the vulnerability...
We were recently working on an audit of the Pwn Appliance, checking to ensure each tool was documented, relevant, useful, AND up-to-date. If you look at the pure number of tools, we're a little...