We do not guarantee you will not get hacked
I am not sure if anyone is saying this -but there are no guarantees on the Internet. We will be honest with you and tell… Read More »We do not guarantee you will not get hacked
I am not sure if anyone is saying this -but there are no guarantees on the Internet. We will be honest with you and tell… Read More »We do not guarantee you will not get hacked
Session Hijacking is where an attacker Steals a network session by guessing (or other ways) the session ID (identification number). Each packet has a… Read More »Session Hijacking is where attacker obtains access to your computers
Rapid7 has many tools like metasploit a software that runs many exploits against a target machine. “It is the world’s most used penetration testing software”. the hackers are… Read More »We use pentesting tools like Metasploit from Rapid7
Is there a weak link? Is your firewall all patched up? Does it have the latest firmware? Are all ports closed that should be closed?… Read More »Do you have weak security?
Malwarebytes has a good FAQ about the Heartbleed problems we have posted in our own Blog on Oversitesentry as well. Essentially there are online tools (LastPass) to… Read More »Media hype on heartbleed – explaining…
First of all, there are many ways a system can become vulnerable, we will not look at the malicious or badly configured machines. We will… Read More »How does a computer system become vulnerable?
Wired had an article a while ago (January 6th 2014) To understand the problem, you need to understand the embedded systems market. The problem is the… Read More »Yet another difficult Internet problem: embedded computers are rarely patched
By “casing” can also be called enumeration, where the hacker reviews what type of systems that you have on the Internet. It is the first… Read More »Hackers are casing your computer systems now
PCISecurityStandards.org has a website and it’s response to the Target Data breach: “As part of this security effort, the Council maintains that adherence to and maintenance of… Read More »PCI compliance – what does it entail?
Dark Reading has an interesting article about how Target was compliant with PCI(Payment Card Industry) standards and it was not enough. The Point of Sale terminals… Read More »Develop new & better security postures – PCI compliance is not enough