Mozilla has announced that the new version 31.0 of Firefox, released earlier this week, will check individual file downloads against Google's Safe Browsing reputation service to determine if they are known malware. http://lnkd.in/dUTevf6
http://www.ibtimes.co.uk/nsa-proof-server-protonet-smashes-crowdfunding-record-by-raising-1m-89-minutes-1451301 #crouwdfunding #nsa
- CleveridgeOwner, 2013 - present
- Flemish Net ServicesOwner, 2000 - 2013
As a Hacking Lab or security lab, Cleveridge is able to offer you a whole range of services with transparancy, integrity and confidentiality as the three key values.
Going from quick scans to full scale organized hacking, this all in function not to harm your systems but for you to be able to sharpen your online - and often also offline - security measures.
No matter what kind of task you want, we guarantee a comprehensive report and a hands-on support.
Although each client has his own needs, here you can find a shortened list of our services:
Quick Scans :
With a focus on smaller organisations we will scan websites and/or networks for wellknown vulnerabilities. The depth of the scans will depend on the time we are able to spend on the task. A Quick Scan is also available for organisations with a small budget.
All organized attacks on websites, networks and/or organisations are preceded by a more or less extended form of information collecting.
Cleveridge hunts as a hacker (team) for information that may be important for attackers. You will be amazed at the amount of information available that makes your organization vulnerable. We bring you all the information clearly in the picture and explain to you why the information obtained can be dangerous for your organisation.
Penetration Testing :
Putting it all together....
After an extended footprinting, scanning and enumeration procedure, a Cleveridge Ethical Hacker team will launch an attack on your organizations' infrastructure without doing any harm to it.
Depending on the assignment our friendly attackers try to infiltrate and collect all kinds of what must be save data and/or try to simulate a controlled service distortion.
Our attackers focus can go out to a predefined goal depending on our clients wishes.
Our penetration test gives you an extended vulnerability overview that will be fully - step by step - reported, debriefed and followed up.
- Sint-Jan Berchmanscollege, Mol
- Technisch Instituut Sint-Paulus, Mol