Monthly Archives: May 2016

HOW TO DO SECURE DATA DESTRUCTION OF INFORMATION FROM STORAGE DEVICES?

There are statistical evidences supported by data destruction companies which present that in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, and India; two out of three companies face data management problems & risks. Data should be … Continue reading

Posted in Cyber Security, Pentest, Software Testing company in Mexico | Tagged , , , | Leave a comment

JUDGE TOSSES EVIDENCE GATHERED BY FBI’S TOR EXPLOIT

The FBI’s refusal to share details about a network investigative technique it used to gather evidence against a Vancouver teacher charged with possession of child pornography has forced a federal judge’s hand to exclude the evidence from trial. The NIT … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged | Leave a comment

HOW TO IMPLEMENT DATA SECURITY MANAGEMENT SYSTEM?

According to the global perspective of enterprise data security company; integrity, confidentiality, availability, auditability, and non-repudiation are the five fundamental pillars for any business data security solution. For small and medium-sized companies in countries like Mexico, Brazil, United States, Colombia, … Continue reading

Posted in Cyber Security, Empresa de SEO en México, Software Testing company in Mexico, Vulnerabilidad | Tagged , , , | Leave a comment

John McAfee and his crew claim to have hacked a WhatsApp Message, But …

The popular security expert John McAfee and a team of four hackers demonstrated that is is possible to read WhatsApp message. The cybersecurity expert John McAfee and four hackers demonstrated that is is possible to read aWhatsApp message even if … Continue reading

Posted in Cyber Security, Malware | Leave a comment

Hackers target the campaigns of presidential contenders

The US Director of National Intelligence James Clapper revealed that attackers are targeting the campaigns of US presidential contenders. At the end of 2015, I published a post titled “2016 Cyber Security Predictions,” one of my prediction is related the … Continue reading

Posted in Cyber Security, Malware | Leave a comment

Paranoid Furtim Malware Checks for 400 Security Products Before Execution

Malware most likely used in cyber-espionage campaigns. A security researcher that goes online only by the nickname of FireFOX (@hFireF0X) has discovered a unique malware family that pays a lot of attention to remaining undetected, and not to having great features … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

YouTube skiddie busted for hacking Country Liberal Party

Bought jewellery for his significant other with members’ credit cards. A man from the Australian state of Victoria has been charged after stealing, using, and publishing credit cards of political party members using basic tricks he learned from YouTube. Aaron … Continue reading

Posted in Vulnerabilidad | Tagged | Leave a comment