-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: October 2014
Drupal 7.x SQL injection vulnerability
A newly patched SQL injection flaw in Drupal leaves sites that rely on the widely used web development platform wide open to attack. Admins of sites that run Drupal 7 should upgrade to 7.32 to guard against possible attack. The … Continue reading
Posted in Cyber Security, Pentest
Tagged drupal bug, drupal vulnerability, hacking etcio
Leave a comment
Network security of SMEs
There are many threats that can damage a company’s network. Often the recklessness of some employees to use the Web, email or instant messaging is used. The solution is to set clear rules and enforce them. A corporate network may … Continue reading
Como puertas pueden ayudar los hackers a hackear
Durante un pentest el intruso no especifica el protocolo en la exploración contra el puerto 80 (el Protocolo de Transferencia de Hipertexto, o HTTP), porque Nmap utilizará de forma predeterminada TCP (Transmission Control Protocol), y hay pocas razones para buscar … Continue reading
KMART payment terminal system hacked : Credit/Debit cards data breach
Kmart Investigating Payment System Breach October 10, 2014 To Our Members, I am reaching out to inform our loyal Kmart customers of a recent payment security incident. On Thursday, Oct. 9, 2014 our IT team detected that our … Continue reading
Posted in Cyber Security
Tagged kmart, kmart hack, www.iicybersecurity.com/index-eng.html
Leave a comment
Call Penetration Testing company before your get harmed
What is Ethical Hacking in Information Security world? Ethical Hacking is a project consists of a computer controlled systems and / or communications of a company or organization using the same means that a malicious user uses to attack an … Continue reading
Posted in Uncategorized
Leave a comment
icloud un riesgo de seguridad muy grande
No paso mucho tiempo desdelas noticias de hacking de icloud había alcanzado el fuego, y de nuevo fotos desnudo de celebridades han ido viral en internet. Una vez más un hack ha sido realizado y celebridades: Kim Kardashian, Vanessa Hudgens, … Continue reading
Posted in Uncategorized
Leave a comment
Que es BadUSB
Luego de que hace unos días se publicara el código fuente de BadUSB, lo cual nos puso a la espera de que se hallara una solución definitiva a ese “aterrador” malware que se escondía en los dispositivos extraíbles, efectivamente se … Continue reading
Qbot malware, known as Qakbot, infected more than 500,000 unique systems
Researchers with security company Proofpoint have identified a Russian-speaking cybercrime group that has infected more than 500,000 systems and is targeting online credentials for major banks in the U.S and Europe. The group, which Proofpoint is referring to as ‘Northern … Continue reading
Posted in Cyber Security, Pruebas de Software
Tagged Information Security Company, Qbot malware
Leave a comment
Yahoo servers hacked by Bash bug flaw
Romanian hackers used Bash Bug flaw to hackYahoo servers, according to a recent security news update. Jonathan Hall, President of the IT consulting firm, Future South Technologies and a security researcher, has affirmed that a group of Romanian hackers used … Continue reading
Prueba de penetración y evaluación de los riesgos
Una Pentest(prueba de penetración) de seguridad de datos es un sondeo sistemático de un sistema en busca de vulnerabilidades. En la mayoría de los casos, la prueba de penetración se realiza externamente, desde una ubicación remota, poniendo a prueba sus … Continue reading