Profile

Cover photo
81 followers|8,197 views
AboutPostsPhotosYouTube

Stream

intiGrow

Shared publicly  - 
 
12 ways to protect your organization from phishing this Christmas season http://buff.ly/1sDL077
1
Add a comment...

intiGrow

Shared publicly  - 
 
How Your Pacemaker Will Get Hacked. http://buff.ly/1qitMAB
Concerns about the potential vulnerability of medical devices are getting the attention of regulators, health-care providers, and manufacturers.
1
Add a comment...

intiGrow

Shared publicly  - 
 
PCWorld: 'Dridex' malware revives Microsoft Word macro attacks. http://buff.ly/1AmKF10
1
Add a comment...
 
Facebook now offers free anti-malware software if it detects an infection when you login. http://buff.ly/1jr1mP3
1
Add a comment...

intiGrow

Shared publicly  - 
 
ProtonMail Arrives In Public Beta. http://buff.ly/1vDQwKw
1
Add a comment...
Have them in circles
81 people
Titania's profile photo
Abdelfattah ABUQAYYAS's profile photo
Switz AntivirusUK's profile photo
Switz Antivirus UK's profile photo
Johan Green's profile photo
Abhishek Ranjan's profile photo
Tom McLain's profile photo
David Martin's profile photo
Information Security Buzz's profile photo

intiGrow

Shared publicly  - 
 
Google open sources security testing tool Firing Range, a Java app with XSS and other web vulnerabilities. http://buff.ly/1vozkvb
Google today released security testing tool Firing Range, a Java application that contains a wide range of XSS and a few other web vulnerabilities. A deployed version is available on Google App Engine and since the tool is open source you can check out the code on GitHub.
1
Add a comment...

intiGrow

Shared publicly  - 
 
NDTV: Microsoft Issues Emergency Fix for Domain Privileges Security in Windows. http://buff.ly/1vozcMt
The vulnerability could allow an attacker to upgrade unprivileged domain user account privileges to those of a domain administrator account.
1
Add a comment...

intiGrow

Shared publicly  - 
 
PCWorld: GlassWire review: This free network security tool tells all about your network traffic. http://buff.ly/1y6Bj46
Share on Facebook Share on Twitter Share on Google+ Share on LinkedIn Share on Pinterest Who is your computer talking to? Your browser isn't the only application that's sending data online. Your word processor might be phoning home; a file undelete utility might be talking to its mother ship, and even Windows' own services may surprise you. These are not necessarily nefarious actions, but they're worth knowing about. GlassWire is a free and b...
1
Add a comment...

intiGrow

Shared publicly  - 
 
VOA News: New Malware Targets Apple Devices. http://buff.ly/1uyzmzJ
Palo Alto Networks Inc. has discovered a new family of malware that can infect Apple Inc.'s desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhone...
1
Add a comment...

intiGrow

Shared publicly  - 
1
Add a comment...

intiGrow

Shared publicly  - 
 
Public Hotspots Are a Privacy and Security Minefield: Shield Yourself. http://buff.ly/1nnIJed
Protecting your data from prying eyes while on the move is more important and easier than ever An axiom among network security pros is that you should treat public Wi-Fi hotspots like the cyber equivalent of public bathrooms: a convenience we all use, but only with the requisite hygiene. You wouldn’t [...]
1
Add a comment...
People
Have them in circles
81 people
Titania's profile photo
Abdelfattah ABUQAYYAS's profile photo
Switz AntivirusUK's profile photo
Switz Antivirus UK's profile photo
Johan Green's profile photo
Abhishek Ranjan's profile photo
Tom McLain's profile photo
David Martin's profile photo
Information Security Buzz's profile photo
Contact Information
Contact info
Phone
302.252.0525
Story
Tagline
Helping You Grow
Introduction
We are a Global Enterprise Information Security company delivering comprehensive security solutions and competitively priced security services to a myriad of industry verticals, empowering enterprises to achieve a business enabled defense-in-depth security posture, manage corporate risk, improve compliance, and attain proactive detection and prevention of security threats to their computing infrastructure, data, and applications.