top of page

Publications

1000_F_321430761_qQi0CU9tzI5w1k1vJgdA02LMtXtsXvJE.jpg
d4b5a6d240f978b77986f6f5f6d7deb9.png

This legal article delves into the issue of "Google Dorking," an often ignored but highly effective computer-crime technique employed by hackers, cyberstalkers, and cybercriminals...

5ab181_fd11b7c064034005a2847192e6f6dabf~mv2.jpg
law360-logo-2021.png

Did you know that your passwords, webcams and credit card numbers could be exposed online without

your knowledge, and it doesn't even take an expert hacker to access it?

IMG_3790.JPG
thecisotimes_black_No-BG_edited.png

Star Kashman, Bea Rubin, Samantha Piper

“Search Engine Hacking,” also called “Google dorking," has quickly become a favorite technique of hackers to find and expose private or sensitive information that is not intended for public access...

bottom of page