Monthly Archives: September 2014

Data protection and information security difference

According to experts from network security company in Computer Security we must distinguish between, Information Security and Data Protection. One must distinguish between the two, because they form the basis and reason, justify the selection of data elements that require … Continue reading

Posted in Uncategorized | Leave a comment

Protección web con pruebas de penetración

 Una prueba de penetración, pentest es un método de evaluación de la seguridad de un sistema informático mediante la simulación de un ataque. Una prueba de penetración de aplicaciones web para seguridad de datos se centra sólo en la evaluación … Continue reading

Posted in Uncategorized | Leave a comment

PayPal ad campaign hits Apple on payment security

PayPal took out an assertive full-page ad in the New York Times Tuesday questioning the security of Apple’s new payment system, Apple Pay. The ad reads: “We the people want our money safer than our selfies,” a reference to the … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

DoS Scans Spoof Google Public DNS Server

The SANS Internet Storm Center this afternoon reported SNMP scans spoofed from Google’s public recursive DNS server seeking to overwhelm vulnerable routers and other devices that support the protocol with DDoS traffic. “The traffic is spoofed, and claims to come … Continue reading

Posted in Cyber Security, Pentest | Tagged | Leave a comment

With Data Security Company, leave no stone unturned

The data security and confidentiality of information are a must. Privacy in this field must be taken into account when defining corporate strategy and data management that incorporate best practices on Data Security from premature stages of planning is the … Continue reading

Posted in Uncategorized | Tagged | Leave a comment

Seguridad de aplicaciones web con ayuda de curos de seguridad

Seguridad del Sitio Web se ve a menudo incorrectamente como un conjunto de problemas de seguridad basadas en host del servidor y, en lugar de a nivel de código y las vulnerabilidades de seguridad basadas en configuración que alguien puede … Continue reading

Posted in Uncategorized | Leave a comment

PCI Council updates skimming prevention guidance

PCI SECURITY STANDARDS COUNCIL PUBLISHES MERCHANT GUIDANCE ON SKIMMING PREVENTION — Resource for retailers and others that handle payment card data updated to address memory scrapers, mobile device weaknesses, EMV chip cards and other new attack source:https:https://www.pcisecuritystandards.org/pdfs/14_09_10_Skimming%20Guidance%20Press%20Release.pdf information security training

Posted in Cyber Security, Pentest | Tagged | Leave a comment