Hiring a Hacker for Evil
It seems it is not so hard to hire a hacker for evil. Several articles discuss the how and why: http://bgr.com/2015/01/16/how-to-hire-a-hacker/ There is even a website that apparently had so…
Cyberattacks too difficult – I give up
Massive cyberattacks, difficult configurations? what to do from here? All I have is some unusable data to the hackers – what is important about our stuff. We are inundated with…
2 Steps Stop All Cyberattacks
1. Obtain a technology that will be able to see the attacker trying to communicate with the attack software(malware etc) in your network. This system should have the capability to…
Improving Data Security (Especially Medical)
We know the problems with the Anthem Breach: no encryption But does it mean you should encrypt your data? What does it mean to “encrypt the data” What if your…
Why is Pentesting Needed?
Why can’t I just use an automated service like http://www.trust-guard.com ? One reason to reconsider only using Trust-guard is that it is not QSA certified from the PCI Security Standards…
