Back to Top

HEY TEAM! MY NAME IS JESSE SMITH, AKA VEKKTOR33.

I RUN JES2S, A BIZ THAT HELPS COMPANIES KEEP THEIR SYSTEMS AND DATA SECURE.

nidNetwork intrusion detection

I provide managed intrusion detection services, using my experience and several tools to detect any cyber threats, even the most recent ones, thus making sure that your business is protected at all times.

wisWireless intrusion detection

I have built a custom Wireless Intrusion Prevention System that can filter unwanted wireless traffic, locking down the unknown devices. Use my WIPS to discover any attackers and stop them in their tracks.

vsrVulnerability scanning and reporting

Use my services to identify, and then rank the discovered issues based on their impact on the network. Then, receive a detailed report that highlights what needs to be done to keep your network secure.

dlpsData loss prevention services

Your company generates, processes and then stores a lot of precious data. I can set up data loss prevention systems which guarantee that your data doesn't get lost and/or fall into the wrong hands.

ESSENTIAL SECURITY GUIDES

How to identify evil websites

There are lots of fake and/or fraudulent websites on the Internet. More and more cyber criminals manage to rip off innocent, unsuspecting people, often by utilizing phishing. It's not a surprise, because according to a McAfee survey, 97% of people are unable to identify phishing emails, which include links that lead to evil sites. Here are several bits of advice that should help you identify emails and websites which are used by hackers to steal your money and/or information.

With phishing, cyber attackers try to get people to disclose confidential information by claiming to represent legitimate commercial entities and websites – banks, for example. And with spear phishing, hackers will target particulars individuals or businesses, trying to install malware on their computers.

Read More

websites

Essential wireless security issues

Wi-Fi networks provide several important business advantages in comparison with their wired counterparts. However, they can also introduce serious security risks. According to wireless security expert George Hardesty, CEO of Data Alliance, man-in-the-middle (MitM) attacks continue to be the most common Wi-Fi threat. Hackers make use of MitM to intercept communication between two parties, and will often get access to unencrypted data and information, especially for sites and web-based applications that don't utilize HTTPS authentication and encrypted data transfers.

Rogue Wi-Fi networks are used by cybercriminals who set up wireless hotspots that mimic trusted networks. A hacker who is sitting in the lobby may set up a hotspot which has a name that's identical with the hotel that you are currently staying at, for example. It's quite clear that some people will connect their devices to the hacker's open hotspot, becoming part of his network.

Read More

wireless

RECENT SECURITY NEWS

Massive eGobbler malvertising campaign targets iOS users

A new malvertising campaign that's based on session hijacking is targeting lots of iOS devices. People are unwillingly sent to other websites and landing pages due to a simple JavaScript directive.


Read More


Hotspot finder app exposes 2 million Wi-Fi network passwords

The app has over 100K installs, allowing its users to share their own Wi-Fi passwords with others. The software's online database was unencrypted, though, storing all the SSIDs, locations and passwords in plain text.


Read More


Fake Instagram assistance apps from Google Play are stealing passwords

Building a huge number of Instagram followers takes a lot of work. Several "Instagram assistance" apps gather the users' name and passwords, and then upload them to known malicious servers.


Read More


ThreatList: tax scammers launch a raft of fake mobile apps

RiskIQ has recently crawled the applications that can be downloaded from the most popular app stores. Over 4 million apps use tax-related keywords, and about 30% of them have a suspicious behavior.


Read More


JESSE SMITH IS MY HERO!

Keeping our network in good shape was a complex, tiring task for me. Being a small business owner without a lot of IT knowledge, I didn't even know who and what to ask. Everything changed when I met Jesse! Now I can sleep well at night, knowing that my network and data are kept secure. Not to mention that he's always available whenever I have a question!

Eugene Deberry