New & Notable

Get Started

How to prepare for post-quantum computing security

One of the biggest fears about quantum computing is its ability to easily break current encryption algorithms. Learn why and how to start making quantum security preparations.

News

The latest from Black Hat USA 2025

This is your guide to the breaking news, trending topics and more from Black Hat USA 2025, one of the world's top cybersecurity conferences.

Problem Solve

How to recover from a ransomware attack: A complete guide

With a ransomware recovery plan, organizations can act quickly to prevent data loss without descending into chaos. Learn the crucial steps to incorporate into your plan.

Get Started

How to use the John the Ripper password cracker

Password crackers are essential tools in any pen tester's toolbox. This step-by-step tutorial explains how to use John the Ripper, an open source offline password-cracking tool.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How to use the John the Ripper password cracker

    Password crackers are essential tools in any pen tester's toolbox. This step-by-step tutorial explains how to use John the Ripper, an open source offline password-cracking tool.

  • Get Started

    An explanation of encryption

    Encryption converts data into code that is only decipherable with the right key. This can be used to protect sensitive information in messages, payments and records.

  • Get Started

    An explanation of purple teaming

    Purple teaming unites offensive red teams and defensive blue teams to share knowledge, find vulnerabilities and strengthen security through structured frameworks and playbooks.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security