We have added many pages in the last few days. And will continue to add pages in the coming months. Notice how the menu opens…
The Fixvirus video show that explains it: According to Kaspersky Group report: http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2015/02/Equation_group_questions_and_answers.pdf There is malware that can infect hard drive firmware and then perform…
Bloomberg screenshot this morning. The news reports are out – a Stuxnet malware was installed in your firmware thus infecting your hard drives and…
First we made a special short video on what an Ethical hacker does: Second the Video for the Fixvirus Security show: News of Day is…
Sophos has a good article detailng some potential methods the hackers can use to extort money out of companies: Nakedsecurity Sophos Blogsite This is the important…
Brian Krebs has updated his Blog: and his famous picture (how much is your hacked computer worth): http://krebsonsecurity.com/2015/01/fbi-businesses-lost-215m-to-email-scams/ IC3 data – Internet Crime http://www.ic3.gov /about/default.aspx The…
Pentesting every 3 months for entities with more than 20k transactions annually for less than 20k transactions. Why do you need to pentest? Because things…
We are explaining a little more about pentesting and the service that we have (Sigma Scan) in tip of day. In News of day we…
“Do the right thing” = Philotimo PCI compliance best practices(from page 13 PCI DSS 3.0 doc): Monitoring of security controls—such as firewalls, intrusion-detection systems/intrusion-prevention systems…
http://money.cnn.com/2014/08/18/technology/security/hospital-chs-hack/ CNN story of 4.5 mil records of Community Health Systems – why would hackers want these records? Because the records have ss#, names and…