Facebook has decided to collaborate with the AMBER Alert system, The National Center for Missing and Exploited Children and The U.S. Department of Justice to create 53 individual pages, one for each state including the District of Columbia, Puerto Rico and the U.S. Virgin Islands. Users will start receiving updates via their news feeds. […]
Vulnerability Scanning –
Assess any target with an IPv4, IPv6, or URL with pre-defined policies for PCI, HIPAA, FISMA, and more. Identify CVE, OSVDB, IAVA, OVAL, and more.
Penetration Testing –
Exploit vulnerabilities to gain remote access. Run social engineering, phishing assessments, and more with the exploit tools suite. […]
The average citizen is very lax with the security of their credit card information therefore may be giving a non-verbal invitations to credit card scammers. Understanding how your card can be compromised is the first step to protecting your credit. There are many ways to extract your sensitive data to enable someone to go on a “free” shopping spree. […]
Something I see get overlooked often in reviewing products, especially expensive security products, is support. I’ve done hundreds of product reviews over the years and numerous benchmarking comparisons to find the best software/hardware for the job. Early on I took for granted the type of support and the ease of access to qualified technical support staff, now it is my 2nd priority when investigating any product. […]