Monthly Archives: September 2014

Data protection and information security difference

According to experts from network security company in Computer Security we must distinguish between, Information Security and Data Protection. One must distinguish between the two, because they form the basis and reason, justify the selection of data elements that require … Continue reading

Posted in Uncategorized | Leave a comment

Protección web con pruebas de penetración

 Una prueba de penetración, pentest es un método de evaluación de la seguridad de un sistema informático mediante la simulación de un ataque. Una prueba de penetración de aplicaciones web para seguridad de datos se centra sólo en la evaluación … Continue reading

Posted in Uncategorized | Leave a comment

PayPal ad campaign hits Apple on payment security

PayPal took out an assertive full-page ad in the New York Times Tuesday questioning the security of Apple’s new payment system, Apple Pay. The ad reads: “We the people want our money safer than our selfies,” a reference to the … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

DoS Scans Spoof Google Public DNS Server

The SANS Internet Storm Center this afternoon reported SNMP scans spoofed from Google’s public recursive DNS server seeking to overwhelm vulnerable routers and other devices that support the protocol with DDoS traffic. “The traffic is spoofed, and claims to come … Continue reading

Posted in Cyber Security, Pentest | Tagged | Leave a comment

With Data Security Company, leave no stone unturned

The data security and confidentiality of information are a must. Privacy in this field must be taken into account when defining corporate strategy and data management that incorporate best practices on Data Security from premature stages of planning is the … Continue reading

Posted in Uncategorized | Tagged | Leave a comment

Seguridad de aplicaciones web con ayuda de curos de seguridad

Seguridad del Sitio Web se ve a menudo incorrectamente como un conjunto de problemas de seguridad basadas en host del servidor y, en lugar de a nivel de código y las vulnerabilidades de seguridad basadas en configuración que alguien puede … Continue reading

Posted in Uncategorized | Leave a comment

PCI Council updates skimming prevention guidance

PCI SECURITY STANDARDS COUNCIL PUBLISHES MERCHANT GUIDANCE ON SKIMMING PREVENTION — Resource for retailers and others that handle payment card data updated to address memory scrapers, mobile device weaknesses, EMV chip cards and other new attack source:https:https://www.pcisecuritystandards.org/pdfs/14_09_10_Skimming%20Guidance%20Press%20Release.pdf information security training

Posted in Cyber Security, Pentest | Tagged | Leave a comment

What has changed in Information Security

We must understand and accept at the outset that the situation is not the same as a decade ago, when this discipline was booming. Today the security requirements of organizations demand a radical change in penetration testing to provide them … Continue reading

Posted in Cyber Security, Empresa de SEO en México, Pentest, Pruebas de Software, Software Testing company in Mexico | Tagged , , | Leave a comment

Correo empresarial en la nube y seguridad

Email han sido durante mucho tiempo uno de los primeros lugares las empresas han buscado la externalización a la Computación en la Nube. Esto hace mucho sentido: Pocas empresas están en el negocio de proporcionar correo electrónico (con la excepción … Continue reading

Posted in Cyber Security, Empresa de SEO en México, Pentest, Pruebas de Software, Software Testing company in Mexico | Tagged , | Leave a comment

HealthCare.gov hacked

The Obama administration says hackers breached HealthCare.gov, but no consumer information was taken in the attack on the health insurance website that serves more than 5 million Americans. Instead, hackers installed software that could have been used to launch an … Continue reading

Posted in Cyber Security | Tagged | Leave a comment