About ISEC

This author has not yet filled in any details.
So far ISEC has created 7 blog entries.

Secure Document

Rather than sending sensitive customer information back and forth across cyberspace, Secure Document Transfer System provides a secure framework for online communication, Secure Document Transfer System incorporates the use of the Digital Signature, hand written signature and secure protocol based on PKI to build up a new meaning of secured messaging to ensure your data [...]

By |2019-04-02T12:13:22+02:00October 29th, 2015|Uncategorized|Comments Off on Secure Document

Kevin Mandia: Nation-State Cyber Espionage Becomes the Norm

Almost every country out there ignores that its citizens are hacking, or they’re aiding that activity, or they’re engaging in it directly. And there are, for now, no risks or repercussions to the attackers. That’s the “year in review” assessment of Kevin Mandia, founder of Mandiant and president of FireEye. Speaking at the company’s annual [...]

By |2019-04-02T12:13:22+02:00October 14th, 2015|security|Comments Off on Kevin Mandia: Nation-State Cyber Espionage Becomes the Norm

Apple Pulls Insecure Apps Over Root Certificates

Apple has pulled several apps out of its store over SSL/TLS security concerns. The apps are installing root CA certificates into unsuspecting mobile devices, which then enables traffic to be intercepted, unknown to users. Apple didn’t say which iPad and iPhone apps had been taken down, but ad blockers in particular use root certificates, and [...]

By |2019-04-02T12:13:22+02:00October 11th, 2015|security|Comments Off on Apple Pulls Insecure Apps Over Root Certificates

ID Theft Victims Remain Vulnerable Long After A Hack

The timeliness of detection and diversity of data sources are critical factors in countering attempts to compromise consumer identities. A study from ID Analytics shows that much like a stolen credit card, fraudsters exploit identities rapidly across multiple enterprises to monetize the identity before the consumer and businesses become aware of the compromise. Attempts to [...]

By |2015-10-08T14:44:15+02:00October 8th, 2015|security|Comments Off on ID Theft Victims Remain Vulnerable Long After A Hack