Our Blog

RSS

After reading Monday's The Washington Post, I see yet again (sigh) that a former NSA contractor may have stolen sensitive information. However, this time it’s 75% of their elite hacking tools that Snowden previously highlighted. Harold T. Martin is accused of carrying out the biggest…

Read More

If testing your antivirus program or other applications sounds silly, then consider this your wake-up call. Just because you’ve bought something to protect your services, doesn’t mean it’s a surefire way to protect your data. System applications, embedded applications, games and more are not…

Read More

Day after day we hear stories of companies being breached because of vulnerabilities in their systems. While some of these vulnerabilities may be new, the majority of breaches are caused by vulnerabilities that have had a patch available for weeks, months, even years…

Read More

2016 really made a name for cyber-security. Now let’s make 2017 the year of executing strong cybersecurity plans. In order to fight the war online, you first need to understand what it is you are actually fighting. You hear the buzzwords such as “cybersecurity,”…

Read More

Earlier this year, we mentioned ransomware as a trend to watch in 2017. While some experts believe it will hit a plateau this year, that doesn’t mean that it will be any less harmful to businesses and consumers alike.  Here are 6 things…

Read More

No matter what you call them: threats, weaknesses, risks or vulnerabilities, they’re out there. Are you ready to handle them? Do you have a team internally dedicated to conducting pen-tests regularly? Are the people you’ve hired trained and experienced in conducting pen-tests or seeking…

Read More

I bought a new car this past weekend, and it’s absolutely amazing how much technology, computer systems, and even Internet connectivity exists within the car. It’s not just my car, but all cars, are looking more like computerized spaceships than the simple cars I grew…

Read More

Let’s not fall victim to just talking about securing our businesses or people without putting action behind it. Cyber-security has grown to be a hot topic as technology advancements continue and after many cyber-attacks, breaches and panic in 2016. When hearing details about…

Read More

Database and password incidents are so commonplace that we need a breach the size of Yahoo! or Anthem before the media takes notice. Just like these incidents, you’ve heard the statistics and read the reports which claim that the most common way to…

Read More

In November 8, 2016 Microsoft released a security update for Windows Authentication Methods (MS16-137) which included 3 CVEs: Virtual Secure Mode Information Disclosure Vulnerability CVE-2016-7220 Local Security Authority Subsystem Service Denial of Service Vulnerability CVE-2016-7237 Windows NTLM Elevation of Privilege Vulnerability CVE-2016-7238 Talking specifically about CVE-2016-7237, this…

Read More