Read the first part of our [OWASP TOP 10] series »

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

detectify