DEV Community

Discussion on: Getting started with Penetration Testing and building your own pentest methodology.

Collapse
 
jobethhaw profile image
JobethHaw • Edited

We have to be very careful in this digital world. Today people are using their mobile devices to search for solutions in their network. When they are on public Wi-Fi, they can be pretty ambitious in seeking out information. They can obtain sensitive information from their networks, such as passwords or credit card details. These attacks can be carried out by agents, provocateurs, or other hackers looking to cause disruption or disruption of services. That's why I think that people should put a big accent on cybersecurity.