What are the different kinds of penetration tests and vulnerability assessments? Will you be paying significant money for a cheap service like a vulnerability assessment?
Read MoreWe look at some results from our Icarus SMTP honeypot. We have many spam sources, but we also had some live hackers who are attempting to breach into Largnet.
We also added a quick update on the antivirus performance statistics.
Read MoreLARG*net is offering to our membership free external vulnerability assessments. Email us at security@largnet.ca to sign up.
Read MoreThis project’s goal is to create a SMTP honeypot to collect malware and automatically upload it to virustotal. Simple and to the point. In the future I will expand the honeypot’s features, including the ability to accept attachments and automatically forward them to virustotal to be analyzed.
Read MoreJapanese government passing legislation allowing their National Institute of Information and Communications Technology (NICT) to attempt to breach their citizens’ home and business networks.
Read MoreSecurity has increased greatly in the last 10 years, both in understanding and implementation.
Cyber Security has clearly and objectively gotten much better so we feel safe predicting this trend will continue in the future.
Read More