Pure Hacking is Australia’s leading dedicated, vendor-neutral ethical hacking company in Australia. Its sole focus is risk and security. Today it provides secure development services, secure code reviews, penetration testing and training modules to a range of clients throughout the Asia Pacific region.
Members of the Pure Hacking team regularly present at international seminars, contribute to professional papers on internet security and are highly active in the industry organisations that investigate risk and security across technology platforms.
Pure Hacking spokespeople are available for media commentary on the following internet security-related topics. Please note that these topics are very specific, however Pure Hacking is available for high level commentary on any security issue:
- Software and Infrastructure security
- Penetration Testing – addresses the security of corporate networks from an internal and external perspective
- Web Application Penetration testing – discovering ways to break into various web applications, such as internet banking sites
- Web Appliance Penetration Testing – evaluation of web application firewalls, web content/ URL/anti-malware/anti-spyware filters
- Web Services Penetration Testing
- Mobile Web Application Penetration Testing
- How secure is code – identification of vulnerabilities in either web-based or software-based applications
- Web Application Security Architecture – identifying weak spots in design, layout and security zones. Review web servers in Configuration Reviews to identify weaknesses that can be hardened to increase the security of the web application.
- Binary Analysis – identify copy protection breaches and patent infringements
- Malware Analysis – identification of malicious executable code and determine the actions that it performs on a system
- Mobile Apps – identify the vulnerabilities and security weaknesses of mobile apps and devices
- Cloud computing and Virtualisation – identify attacks on an administrator workstation and manipulation of the virtual infrastructure software weaknesses
- Wireless Security vulnerabilities – identify a range of vulnerabilities including wireless LAN discovery, denial of service attack identification, signal leakage, encryption cracking and spoofing attacks etc.
- VoIP Security – addresses security vulnerabilities within the VoIP environment from phone configuration, call eavesdropping, VoIP denial of service, default server/voicemail/phone passwords etc
- Client-side Software attacks – this is where modern attacks are aimed at Internet Explorer, Adobe Reader, Microsoft Office. Phishing and external penetration tests reveal where compromises take place.
- Rogue employee attacks – how employees or attackers with access to the internal network escalate privileges to control the SCADA environment. This is usually from weak password guessing and password cracking, sensitive information disclosure, Windows enumeration etc
- Managed Virtual Web Application Firewalls/Managed Cloud Web Application Firewall
- Digital forensics – how corporate networks are investigated, trends
- Security Policy and Guidelines Review & Development issues in the Australian corporate sector
- Threat and Risk assessments – what to look for this year
- PCI Compliance
Our Spokespeople:
Robert McAdam, CEO
Robert McAdam began his security career in 1990 with the New South Wales Police Force.
After eight years of active service, he moved to IBM Global Services Australia where he held the roles of Program Manager, Sydney Olympics and Program Manager for Penetration Testing, Managed Firewalls and Intrusion Detection Systems across Asia Pacific in IBM’s Security and Privacy Practice.
In 2002, Mr McAdam started Pure Hacking, which today works with companies both large and small, predominantly in data intensive industries including finance, business services, communications, education and health.
Ty Miller, CTO
Ty Miller is the Chief Technology Officer at Pure Hacking, and leads their specialist security team and strategy to ensure that Pure Hacking is at the forefront of specialist information security services. Ty specialises in all forms of penetration testing and secure infrastructure design. He runs various security courses for Pure Hacking in both web application and infrastructure security, and performs independent security research.
Ty has been in the IT security area for around ten years, is an experienced presenter at high profile security conferences and d is also a co-author of the book Hacking Exposed Linux.