Profile cover photo
Profile photo
SecurityMetrics, Inc.
119 followers -
Secure What's Important.
Secure What's Important.

119 followers
About
Posts

Post has attachment
"...they found evidence that the hackers had attempted to filter their collection of backdoored victim machines to find computers inside the networks of 18 tech firms, including Intel, Google, Microsoft, Akamai, Samsung, Sony, VMware, HTC, Linksys, D-Link and Cisco itself....Now we know this was being used as a dragnet to target these [companies] worldwide...to get footholds in companies that have valuable things to steal"


http://ow.ly/SskR30fl4RR
Add a comment...

Post has attachment
The software engineer said it only took 20 minutes to build an exact copy of Equifax's website. It cost him $15 for domain hosting and server maintenance. Sweeting said he did it to teach Equifax a lesson about its vulnerable URL and how easy it was to spoof.


http://ow.ly/2YM430fkDJw
Add a comment...

Post has attachment
Nick http://ow.ly/O8VX30fkChS Sweeting talks about the spoof website he created in the midst of the Equifax breach.
"The software engineer said it only took 20 minutes to build an exact copy of Equifax's website. It cost him $15 for domain hosting and server maintenance. Sweeting said he did it to teach Equifax a lesson about its vulnerable URL and how easy it was to spoof."
Add a comment...

Post has attachment
"HIPAA and security compliance is definitely the most confusing part of my job, but SecurityMetrics took the time to break it down and make it easier for me to put a plan in place. Now our practice is on the road to compliance. If you're not working with SecurityMetrics yet, you should be." - Joanne Lynch, Fredericksburg Foot & Ankle Center https://www.securitymetrics.com/hipaa
Add a comment...

Post has attachment
You need a pentest. Ethical hacking is a great way to discover where your business security fails.


blog.securitymetrics.com/2015/04/penetration-test-cost.html
Add a comment...

Post has attachment
Yep. Just what it says. After a week of tech news bummers, we need this.



http://ow.ly/Lg0Q30fbXce
Add a comment...

Post has attachment
Use any Apple products? Some points to consider from Wired's Andy Greenberg.

"Differential privacy isn't a simple toggle switch between total privacy and no-holds-barred invasiveness. And a new study, which delves deeply into how Apple actually implements the technique, suggests the company has ratcheted that dial further toward aggressive data-mining than its public promises imply."

http://ow.ly/9YSq30fbXrv
Add a comment...

Post has attachment
"The spies handed a prototype of this technology over to the NSA..." ow.ly/dZbI30fbwTp
Add a comment...

Post has attachment
Nearly half of all Americans are affected by a cyber security breach at Equifax, one of the nation's three major credit-reporting agencies. Here's how to avoid being a victim.
Add a comment...

Post has attachment
Ever wondered what those HIPAA business associate agreements are all about? Our HIPAA Fulfillment Manager Ryan Marshall has got you covered. Check out this week's blog!


http://ow.ly/ggVC30f6K3D
Add a comment...
Wait while more posts are being loaded