security.livein.style
Open in
urlscan Pro
35.214.150.32
Public Scan
Submitted URL: http://security.livein.style/
Effective URL: https://security.livein.style/
Submission Tags: @ecarlesi possiblethreat phishing Search All
Submission: On December 14 via api from IT — Scanned from NL
Effective URL: https://security.livein.style/
Submission Tags: @ecarlesi possiblethreat phishing Search All
Submission: On December 14 via api from IT — Scanned from NL
Form analysis
2 forms found in the DOMPOST https://formsubmit.co/pieter@messec.be
<form action="https://formsubmit.co/pieter@messec.be" method="POST">
<div class="input-group">
<input hidden="" name="type" value="newsletter">
<input type="text" class="form-control" style="width:250px" placeholder="Enter E-mail" aria-label="Email" aria-describedby="button-addon2" name="email">
<button class="btn btn-dark btn-lg" type="submit">Send</button>
</div>
<!-- </form> -->
</form>
POST https://formsubmit.co/pieter@messec.be
<form action="https://formsubmit.co/pieter@messec.be" method="POST">
<input hidden="" name="type" value="query">
<div class="mb-3">
<label for="name" class="col-form-label">First and Last Name: </label>
<input type="text" class="form-control" id="name" name="name">
</div>
<div class="mb-3">
<label for="email" class="col-form-label">Email: </label>
<input type="email" class="form-control" id="email" name="email">
</div>
<div class="mb-3">
<label for="query" class="col-form-label">Query: </label>
<!-- <input type="textarea" class="form-control" id="query" name="query"> -->
<textarea class="form-control" style="height:150px;width:100%" id="query" name="query"></textarea>
</div>
<button type="submit" class="btn btn-primary">Submit</button>
</form>
Text Content
* WHAT WE DO * WHO WE ARE * GET IN TOUCH SOLVING YOUR DIGITAL CHALLENGES Protecting people and companies by sharing knowledge, performing research, innovation & managing risks. Get In Touch SIGN UP FOR OUR NEWSLETTER Send CYBERSECURITY Protect your environment by attacking or understanding it. We emulate a malicious attacker by performing similar attacks on your environment, but in a controlled way. Depending on the need and your organizations cybersecurity maturity level, we recommend different type of tests to perform. For the individual, we also offer a digital identity check, which checks your online footprint. * On-demand option: do the check when you want it. You get a single digital identity footprint as well as some recommended actions. * Continuous service; where we notify you when for example your account was known to be breached. On a monthly basis you get a complete digital identity footprint report and a recommended actions summary. VULNERABILITY SCAN Scanning of systems, applications and networks for potential weaknesses. PENETRATION TEST A thorough, manual penetration test, personalised and executed in accordance to the scope of the client. WEB APPLICATION PENTEST A thorough, web application penetration test, using automated tools and manual actions to identify as many potential weaknesses as possible. WIRELESS PENTEST Analyzes the wireless networks in your environment for common misconfigurations, unsecure protocols, known vulnerabilities, ... PHISHING TESTS Together with the company we set-up a phishing campaign to identify potential gaps in the employees' knowledge that might leave the company susceptible to attacks. PHYSICAL ACCESS CONTROLS We verify the digital access controls (ex. RFID tags) in place and verify whether these are of a high enough standard, properly installed and properly used. DIGITAL IDENTITY CHECK We check your online footprint and identify some improvements. We offer this as a one-time option or a continuous service. RESEARCH Solving problems, reducing risks & transforming innovative ideas You or your company might have a great idea, but not the expertise or the time to execute on it, we're here to help. A side-part of your business is getting more traction and you want to investigate the real potential, but since it's not your core business you don't want to divert the attention of your employees just yet, we're here to help. You simply need an extra pair of hands and half a brain so you can execute on a time-sensitive project, we're here to help. INNOVATION PROJECTS We execute your innovation idea as if it was our own. An example delivery here would be a proof of concept or feasibility study. PROTOTYPING You wish to create a single product or a small batch of products to evaluate the business value, to gain customer feedback or to start evaluating. A prototype could be one or a combination of the following: software, electronics, 3D Printing, CNC milled, Laser engraved, wood turned. CUSTOM RESEARCH PROJECT If you have a challenging problem that needs addressing or a custom query, feel free to reach out. TRAINING Knowledge is Power We will be offering basic cybersecurity training in different formats so we can reach as many people as possible. This is planned to be ready for Summer 2022 but feel free to reach out in case you're interested for a sneak preview. If you're interested in a more advanced cybersecurity training or focused around a specific topic feel free to reach out. VIRTUAL We offer a basic cybersecurity course that is accessible from the internet; ideally for awareness training or to get a basic understanding of the highest cybersecurity risks. CO-TRAINING Two people walk through the course together in a hands-on way. This will offer superiour retention. IN PERSON We offer the basic cybersecurity training in person or on request, custom tailored trainings. FREQUENTLY ASKED QUESTIONS WHAT'S THE DIFFERENCE BETWEEN A VULNERABILITY SCAN AND A PENETRATION TEST? A Vulnerability Scan or Vulnerability Assessment tries to identify known vulnerabilities in networks, devices and applications. This is mainly an automated process and doesn't exploit the vulnerabilities. A Penetration Test needs a skilled practicioner that can configure and use different tools to identify known, but also unknown issues. This identification is typically followed by the exploitation phase which proves without a doubt that the risk is present. OUR TEAM (One man strong for now) PIETER MESSELY Founder Messec +12 years experience in the technology sector in various roles; ranging from designing and programming algorithms for smart traffic cameras to leading global cross-functional teams creating a variety of innovative products. A self-proclaimed problem solver with a strong interest in continuous learning and hacking in both the electronic and cybersecurity sense. CONTACT INFO * Name: Messec BV * Main Location: Kleine Heide 101 - 9600 Ronse, * Phone: +32 477 969 211 * Email: info@messec.be * Social: * BTW / VAT: 0772.622.915 * RPR: Ghent, department Oudenaarde © Mapbox © OpenStreetMap Improve this map Cookie preferences © 2021 - Messec.be. All rights reserved Privacy Policy Cookie Policy Algemene voorwaarden GET IN TOUCH Fill out this form and we will get back to you First and Last Name: Email: Query: Submit Close MANAGE COOKIES We use cookies to provide and secure our websites, as well as to analyze the usage of our websites, in order to offer you a great user experience. To learn more about our use of cookies see our Cookie Policy. None Accept None