Tabnapping – new style of attack
I normally do not make so many cross links from my sites, but If you are now seeing this for first time, Please be aware of this new style of attack. I explain it a… Tabnapping – new style of attack
I normally do not make so many cross links from my sites, but If you are now seeing this for first time, Please be aware of this new style of attack. I explain it a… Tabnapping – new style of attack
My Kickstarter Project Link The Ebook will be available within 2 weeks from now Contact me if you are interested in the E-book If interested in this book contact me, as I am still working on it… Kickstarter project ” Computer Security Simplified”
In the on air interview I discussed a kickstarter project on a book, but that did not go anywhere in time (as Stan Fine thought so) anyway kickstarters on books do not seem to work… On radio Wed 11am – 11:30am KXEN 9/2014
We perform the Alpha scan to perform the initial scans, and then use the information to perform penetration testing (or pentesting) with the Sigma scan to attack the site as a hacker would do. If there are custom needs… Penetration testing to test attack your site
It is important to patch your software, I know it is tedious, and sometimes (for Windows) it requires a reboot. for WordPress one may need to get out of the current tasks and perform the… New WordPress 4.0 ready to be upgraded
There are many news reports of Celebrities getting their accounts hacked and then pictures were taken in their archives of a compromising nature. It is evident that everyone needs to have Two Factor Authentication (2FA),… iCloud account hacks could have been averted
The security industry is usually very quiet about how security affects their products. So in the new 3rd Quarter IBM threat intelligence Quarterly for 3rd quarter. the following 2 charts are very interesting: April 8, 2014 is… The effect of Heartbleed attacks on IBM customers
We are your network/Security shield. We defend your computer network and have done so for close to 20 years now – You will see our new logo placed in several spots from here on out.
Hacker attacks occur for many reasons: #1 Highest reason for an attack is to make money from the attack 8/19 Hackers hack Medical company – 4.5 million data sets stolen 8/5 Synology devices get ransomware 8/2 Jimmy… Why spend money on Security prevention?
It is an old security methodology to review what is necessary in a Security Strategy: People = we know people can cause security holes, give out security secrets, or perform unknown(and known) security problems… People, Process, Technology = Security strategy