The Thorny Road to Becoming a PCI Approved Scanning Vendor

enableIT is pleased to announce it is a PCI (Payment Card Industry) Approved Scanning Vendor (ASV). Becoming an ASV was an educational process for this organization, as the process is an ever changing one. ASV certification is a fluid and adaptive process; its standards continually being revised to account for the latest security threats. Testing skills that gain an organization PCI certification one month, will likely be outdated the next. For this reason I’ve outlined some recent changes to the ASV certification and application processes, as well as how the certification of our organization benefits our clients.

Read More
Fabrice Mouret
MacKeeper Data Breach

MacKeeper, an increasingly popular MacBook optimization tool suite designed to improve overall system speed, has been revealed to have unintentionally exposed several instances of MongoDB containing sensitive customer data. 

Read More
Fabrice Mouret
Evolution of DDoS Attacks

According to a recently released report from Kaspersky, distributed denial of service (DDoS) attacks for the third quarter of 2015 have given us a unique perspective on the future of DDoS trends. Attacks monitored during this period of time feature an attack sustained over 320 hours and include several noteworthy statistics. 

Read More
Fabrice Mouret
Who is Really Driving?

It’s no secret that the computer systems on vehicles have made great strides over the years. Over the course of time from the very first vehicle that had an onboard computer system ( 1968 Volkswagen) all the way to the present, the on board diagnostic system of cars have gone from an interesting luxury to making vehicles a computer on wheels. The things that a computer system allows you to do with your cars nowadays are simply astounding. While there is still a lot to be determined as to how far these vehicle computer systems will go, one thing is for sure, with more computer interactivity comes more potential attack vectors for attackers.

Read More
Fabrice Mouret
Rootnik Trojan Can Gain Deeper Access to Android Devices

It is no secret that the security world as well as the technology world as a whole is moving toward mobile. It is the epidemic that is taking off on leaps and bounds with every day that passes. The days of desktop computers or laptops are a thing of the past; we now have the power of those devices and then some sitting right in our pocket. However, with great power comes great responsibility, which is a calling that mobile devices need to heed too. It is a great luxury to have these powerful machines at our disposal, but they also remain vulnerable to an attack scale that mirrors computers if not a greater scale.

Read More