• ICT Security Service Provider Presented Portfolio And Lectures

    June 14, 2016

    Tags: ,
    Posted in: General

    Compass security on the it-sa: live hacking sessions illuminate attack scenarios on Smartphones Rapperswil, September 13, 2010 as (un) safe are iPhone, BlackBerry & co.? This is the question of Compass security AG (www.csnc.ch) within the framework of their exhibit on the it-sa in Nuremberg. In addition to its comprehensive service portfolio, the ICT-security service provider (Hall 12, stand 329) from 19 to 21 October informs visitors about safety risks in dealing with modern smartphones. Red be different attack methods of the hackers presented and analysed in a live demonstration in the Forum. Also, Marco Di Filippo participates as ICT security expert in the high-noon-talk on the topic of mobile security. Compass security AG specializes in services and solutions for ICT-security. Security assessments are in the foreground to the confidentiality, availability and integrity of corporate data. For her this year’s trade fair appearance at the it-sa compass focuses on aspects related to an expert in these areas penetration Testing, ethical hacking, IT forensics and Mobile.Security. The company checks with methods such as penetration testing and ethical hacking the systems for vulnerabilities, targeted to close security gaps.

    IT forensics relies the company for reconstruction and evidence relevant documentation of suspicious incidents. A comprehensive training program, as well as live hacking presentations complement the portfolio of compass. The spy in your Pocket many smartphone users do not know about the vulnerabilities of their constant mobile companion. iPhone, BlackBerry & co. are always present, especially because more and more increasing their functionality and the applications in everyday use are becoming increasingly important. Also blurs the boundary between private and business use. Stored both contacts and appointments confidential messages, personal images and access data for bank accounts etc. Any hacker who is technically savvy, can determine the location of the cell phone, non SMS messages read, use it as a gateway and eavesdrop even talks.

  • Comments are closed.