-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: May 2016
HOW TO DO SECURE DATA DESTRUCTION OF INFORMATION FROM STORAGE DEVICES?
There are statistical evidences supported by data destruction companies which present that in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, and India; two out of three companies face data management problems & risks. Data should be … Continue reading
JUDGE TOSSES EVIDENCE GATHERED BY FBI’S TOR EXPLOIT
The FBI’s refusal to share details about a network investigative technique it used to gather evidence against a Vancouver teacher charged with possession of child pornography has forced a federal judge’s hand to exclude the evidence from trial. The NIT … Continue reading
HOW TO IMPLEMENT DATA SECURITY MANAGEMENT SYSTEM?
According to the global perspective of enterprise data security company; integrity, confidentiality, availability, auditability, and non-repudiation are the five fundamental pillars for any business data security solution. For small and medium-sized companies in countries like Mexico, Brazil, United States, Colombia, … Continue reading
John McAfee and his crew claim to have hacked a WhatsApp Message, But …
The popular security expert John McAfee and a team of four hackers demonstrated that is is possible to read WhatsApp message. The cybersecurity expert John McAfee and four hackers demonstrated that is is possible to read aWhatsApp message even if … Continue reading
Posted in Cyber Security, Malware
Leave a comment
Hackers target the campaigns of presidential contenders
The US Director of National Intelligence James Clapper revealed that attackers are targeting the campaigns of US presidential contenders. At the end of 2015, I published a post titled “2016 Cyber Security Predictions,” one of my prediction is related the … Continue reading
Posted in Cyber Security, Malware
Leave a comment
Paranoid Furtim Malware Checks for 400 Security Products Before Execution
Malware most likely used in cyber-espionage campaigns. A security researcher that goes online only by the nickname of FireFOX (@hFireF0X) has discovered a unique malware family that pays a lot of attention to remaining undetected, and not to having great features … Continue reading
YouTube skiddie busted for hacking Country Liberal Party
Bought jewellery for his significant other with members’ credit cards. A man from the Australian state of Victoria has been charged after stealing, using, and publishing credit cards of political party members using basic tricks he learned from YouTube. Aaron … Continue reading
HOW TO DEFINE INFORMATION SECURITY PLAN?
The information security plan describes how the security is implemented, defined policies, controls and solutions. The information security plan is developed considering all the IT resources depending on the security levels achieved and the pending aspects. An information security plan … Continue reading
Adobe Releases Flash Player 21.0.0.242 to Fix Zero-Day Exploit
Zero-day discovered by FireEye researchers allows RCE. As it promised on Tuesday, Adobe released today a patch to fix several security-related problems with its Adobe Flash Player. Users are encouraged to download the company’s latest Flash version which is now v21.0.0.242. … Continue reading
Posted in Vulnerabilidad
Leave a comment
Blind XSS Vulnerability Allowed Compromise of GoDaddy Support
Almost four months after disclosing a blind cross-site scripting (XSS) vulnerability to GoDaddy, researcher Matthew Bryant has published details on the vulnerability – because GoDaddy has finally fixed it. Blind XSS flaws are so called because the researcher, pentester, or attacker doesn’t … Continue reading