Monthly Archives: May 2016

HOW TO DO SECURE DATA DESTRUCTION OF INFORMATION FROM STORAGE DEVICES?

There are statistical evidences supported by data destruction companies which present that in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, and India; two out of three companies face data management problems & risks. Data should be … Continue reading

Posted in Cyber Security, Pentest, Software Testing company in Mexico | Tagged , , , | Leave a comment

JUDGE TOSSES EVIDENCE GATHERED BY FBI’S TOR EXPLOIT

The FBI’s refusal to share details about a network investigative technique it used to gather evidence against a Vancouver teacher charged with possession of child pornography has forced a federal judge’s hand to exclude the evidence from trial. The NIT … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged | Leave a comment

HOW TO IMPLEMENT DATA SECURITY MANAGEMENT SYSTEM?

According to the global perspective of enterprise data security company; integrity, confidentiality, availability, auditability, and non-repudiation are the five fundamental pillars for any business data security solution. For small and medium-sized companies in countries like Mexico, Brazil, United States, Colombia, … Continue reading

Posted in Cyber Security, Empresa de SEO en México, Software Testing company in Mexico, Vulnerabilidad | Tagged , , , | Leave a comment

John McAfee and his crew claim to have hacked a WhatsApp Message, But …

The popular security expert John McAfee and a team of four hackers demonstrated that is is possible to read WhatsApp message. The cybersecurity expert John McAfee and four hackers demonstrated that is is possible to read aWhatsApp message even if … Continue reading

Posted in Cyber Security, Malware | Leave a comment

Hackers target the campaigns of presidential contenders

The US Director of National Intelligence James Clapper revealed that attackers are targeting the campaigns of US presidential contenders. At the end of 2015, I published a post titled “2016 Cyber Security Predictions,” one of my prediction is related the … Continue reading

Posted in Cyber Security, Malware | Leave a comment

Paranoid Furtim Malware Checks for 400 Security Products Before Execution

Malware most likely used in cyber-espionage campaigns. A security researcher that goes online only by the nickname of FireFOX (@hFireF0X) has discovered a unique malware family that pays a lot of attention to remaining undetected, and not to having great features … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

YouTube skiddie busted for hacking Country Liberal Party

Bought jewellery for his significant other with members’ credit cards. A man from the Australian state of Victoria has been charged after stealing, using, and publishing credit cards of political party members using basic tricks he learned from YouTube. Aaron … Continue reading

Posted in Vulnerabilidad | Tagged | Leave a comment

HOW TO DEFINE INFORMATION SECURITY PLAN?

The information security plan describes how the security is implemented, defined policies, controls and solutions. The information security plan is developed considering all the IT resources depending on the security levels achieved and the pending aspects. An information security plan … Continue reading

Posted in Cyber Security, Malware, Software Testing company in Mexico, Vulnerabilidad | Tagged , , , , | Leave a comment

Adobe Releases Flash Player 21.0.0.242 to Fix Zero-Day Exploit

Zero-day discovered by FireEye researchers allows RCE. As it promised on Tuesday, Adobe released today a patch to fix several security-related problems with its Adobe Flash Player. Users are encouraged to download the company’s latest Flash version which is now v21.0.0.242. … Continue reading

Posted in Vulnerabilidad | Leave a comment

Blind XSS Vulnerability Allowed Compromise of GoDaddy Support

Almost four months after disclosing a blind cross-site scripting (XSS) vulnerability to GoDaddy, researcher Matthew Bryant has published details on the vulnerability – because GoDaddy has finally fixed it. Blind XSS flaws are so called because the researcher, pentester, or attacker doesn’t … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged , | Leave a comment