Monthly Archives: March 2016

WHAT ARE WEB APPLICATION SECURITY RISKS & ATTACKS?

The websites and web applications are mission-critical business systems that must operate without security problems to process corporate confidential information. And to respect data protection rules, companies must consider web application security testing services. There are statistical evidences supported by … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , , | Leave a comment

HOW TO IMPLEMENT NETWORK SECURITY IN ENTERPRISE NETWORK?

The objective of network security assessment services is to keep data assets secure and protect the enterprise IT infrastructure. Typically, businesses are threatened by technology risks and vulnerabilities for being connected to internet or for handling confidential client information. There … Continue reading

Posted in Cyber Security, Software Testing company in Mexico | Tagged , , | Leave a comment

Vaccine for CTB-Locker, Locky and TeslaCrypt Ransomware Released

It’s better to prevent than to pay the ransom. Romanian security vendor Bitdefender has updated its vaunted anti-ransomware vaccine to add support for the latest versions of the CTB-Locker, Locky and TeslaCrypt ransomware families currently ravaging users all over the globe. The … Continue reading

Posted in Malware | Tagged | Leave a comment

Crypto Ransomware Found On EC-Council Website That Runs A Certified Hacker Program

Short Bytes: A ransomware was found on the official website of EC-Council that runs Certified Ethical hacker program. After EC-Council did not reply to Fox-IT in the context of the malware injected in their site, Fox-IT decided to go public … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

Malware is being signed with multiple digital certificates to evade detection

Malware authors are signing threats with multiple digital certificates to account for a shift from SHA1 to SHA2. Symantec has recently observed various malware families seen in the wild signed with multiple digital certificates. As seen with Suckfly, valid, legitimate certificates … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

Can malware detect that it’s running in your sandbox?

If you think an application is suspicious, then you might run it in a sandbox, a virtual machine, maybe use a debugger, and watch what it does. And if nothing happens then that means it’s safe. Right? Well, maybe not. … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

Apple Macs, iPhones, iPads, Watches, TVs can be hijacked by evil Wi-Fi, PDFs – update now

iOS, OS X, watchOS, tvOS all patched. Updated Apple has today emitted security updates for pretty much everything it makes, and you should install them as soon as you can because it’s all bad news. iPhones, iPads and iPods should grab … Continue reading

Posted in Vulnerabilidad | Tagged , | Leave a comment