security.livein.style Open in urlscan Pro
35.214.150.32  Public Scan

Submitted URL: http://security.livein.style/
Effective URL: https://security.livein.style/
Submission Tags: @ecarlesi possiblethreat phishing Search All
Submission: On December 14 via api from IT — Scanned from NL

Form analysis 2 forms found in the DOM

POST https://formsubmit.co/pieter@messec.be

<form action="https://formsubmit.co/pieter@messec.be" method="POST">
  <div class="input-group">
    <input hidden="" name="type" value="newsletter">
    <input type="text" class="form-control" style="width:250px" placeholder="Enter E-mail" aria-label="Email" aria-describedby="button-addon2" name="email">
    <button class="btn btn-dark btn-lg" type="submit">Send</button>
  </div>
  <!-- </form> -->
</form>

POST https://formsubmit.co/pieter@messec.be

<form action="https://formsubmit.co/pieter@messec.be" method="POST">
  <input hidden="" name="type" value="query">
  <div class="mb-3">
    <label for="name" class="col-form-label">First and Last Name: </label>
    <input type="text" class="form-control" id="name" name="name">
  </div>
  <div class="mb-3">
    <label for="email" class="col-form-label">Email: </label>
    <input type="email" class="form-control" id="email" name="email">
  </div>
  <div class="mb-3">
    <label for="query" class="col-form-label">Query: </label>
    <!-- <input type="textarea" class="form-control" id="query" name="query"> -->
    <textarea class="form-control" style="height:150px;width:100%" id="query" name="query"></textarea>
  </div>
  <button type="submit" class="btn btn-primary">Submit</button>
</form>

Text Content

 * 
   WHAT WE DO
 * 
   WHO WE ARE
 * 
   GET IN TOUCH


SOLVING YOUR DIGITAL CHALLENGES

Protecting people and companies by sharing knowledge, performing research,
innovation & managing risks.

Get In Touch


SIGN UP FOR OUR NEWSLETTER

Send


CYBERSECURITY

Protect your environment by attacking or understanding it.

We emulate a malicious attacker by performing similar attacks on your
environment, but in a controlled way. Depending on the need and your
organizations cybersecurity maturity level, we recommend different type of tests
to perform.

For the individual, we also offer a digital identity check, which checks your
online footprint.

 * On-demand option: do the check when you want it. You get a single digital
   identity footprint as well as some recommended actions.
 * Continuous service; where we notify you when for example your account was
   known to be breached. On a monthly basis you get a complete digital identity
   footprint report and a recommended actions summary.




VULNERABILITY SCAN

Scanning of systems, applications and networks for potential weaknesses.


PENETRATION TEST

A thorough, manual penetration test, personalised and executed in accordance to
the scope of the client.


WEB APPLICATION PENTEST

A thorough, web application penetration test, using automated tools and manual
actions to identify as many potential weaknesses as possible.


WIRELESS PENTEST

Analyzes the wireless networks in your environment for common misconfigurations,
unsecure protocols, known vulnerabilities, ...


PHISHING TESTS

Together with the company we set-up a phishing campaign to identify potential
gaps in the employees' knowledge that might leave the company susceptible to
attacks.


PHYSICAL ACCESS CONTROLS

We verify the digital access controls (ex. RFID tags) in place and verify
whether these are of a high enough standard, properly installed and properly
used.


DIGITAL IDENTITY CHECK

We check your online footprint and identify some improvements. We offer this as
a one-time option or a continuous service.


RESEARCH

Solving problems, reducing risks & transforming innovative ideas

You or your company might have a great idea, but not the expertise or the time
to execute on it, we're here to help.

A side-part of your business is getting more traction and you want to
investigate the real potential, but since it's not your core business you don't
want to divert the attention of your employees just yet, we're here to help.

You simply need an extra pair of hands and half a brain so you can execute on a
time-sensitive project, we're here to help.




INNOVATION PROJECTS

We execute your innovation idea as if it was our own.

An example delivery here would be a proof of concept or feasibility study.


PROTOTYPING

You wish to create a single product or a small batch of products to evaluate the
business value, to gain customer feedback or to start evaluating.

A prototype could be one or a combination of the following: software,
electronics, 3D Printing, CNC milled, Laser engraved, wood turned.


CUSTOM RESEARCH PROJECT

If you have a challenging problem that needs addressing or a custom query, feel
free to reach out.


TRAINING

Knowledge is Power

We will be offering basic cybersecurity training in different formats so we can
reach as many people as possible. This is planned to be ready for Summer 2022
but feel free to reach out in case you're interested for a sneak preview.

If you're interested in a more advanced cybersecurity training or focused around
a specific topic feel free to reach out.


VIRTUAL

We offer a basic cybersecurity course that is accessible from the internet;
ideally for awareness training or to get a basic understanding of the highest
cybersecurity risks.


CO-TRAINING

Two people walk through the course together in a hands-on way. This will offer
superiour retention.


IN PERSON

We offer the basic cybersecurity training in person or on request, custom
tailored trainings.


FREQUENTLY ASKED QUESTIONS


WHAT'S THE DIFFERENCE BETWEEN A VULNERABILITY SCAN AND A PENETRATION TEST?

A Vulnerability Scan or Vulnerability Assessment tries to identify known
vulnerabilities in networks, devices and applications. This is mainly an
automated process and doesn't exploit the vulnerabilities.

A Penetration Test needs a skilled practicioner that can configure and use
different tools to identify known, but also unknown issues. This identification
is typically followed by the exploitation phase which proves without a doubt
that the risk is present.


OUR TEAM

(One man strong for now)


PIETER MESSELY

Founder Messec

+12 years experience in the technology sector in various roles; ranging from
designing and programming algorithms for smart traffic cameras to leading global
cross-functional teams creating a variety of innovative products.

A self-proclaimed problem solver with a strong interest in continuous learning
and hacking in both the electronic and cybersecurity sense.


CONTACT INFO

 * Name: Messec BV
 * Main Location: Kleine Heide 101 - 9600 Ronse,
 * Phone: +32 477 969 211
 * Email: info@messec.be
 * Social:
 * BTW / VAT: 0772.622.915
 * RPR: Ghent, department Oudenaarde

© Mapbox © OpenStreetMap Improve this map
Cookie preferences

© 2021 - Messec.be. All rights reserved Privacy Policy Cookie Policy Algemene
voorwaarden

GET IN TOUCH

Fill out this form and we will get back to you

First and Last Name:
Email:
Query:
Submit
Close


MANAGE COOKIES

We use cookies to provide and secure our websites, as well as to analyze the
usage of our websites, in order to offer you a great user experience. To learn
more about our use of cookies see our Cookie Policy.

None
Accept
None