BLOG ARCHIVE

Huffington Post Attacked by Hackers

If you have visited Huffington Post’s website in the last week you may want to scan your computer, if you can even use it. Cyber security firm Cyphort announced they found a cyber-attack and extortion campaign being run through the popular news website. This attack, which spanned from December 31st… Read More

Update on POODLE SSL 3.0 Vulnerability

Similar to the previous POODLE vulnerability we wrote about two months ago is back and this time, it has the ability to affect even the newest version of the protocol. The new vulnerability is only estimated to affect under 10% of servers. The current POODLE attack can be executed with… Read More

Microsoft Releases Patch For Dangerous SSL Vulnerability

Perhaps the most commonly known vulnerability of the year was the Heartbleed bug which exploited SSL’s in browsers everywhere. Microsoft may have a similar issue on their hands and has released a patch through Windows Update. This update is extremely critical for anyone using Windows and should be updated as… Read More

How Do I Know If I Am On a Secure Site?

In this day and age internet security is extremely important to users. Because there are many ways for your information to be stolen, secure websites are the only way to safely submit information online. A secure website facilitates a safe connection between a website and the web browser in order to protect… Read More

Transitioning from SHA-1 to SHA-2

The transition from SHA-1 to SHA-2 (Secure Hash Algorithm) is coming soon. On November 7th, 2014, Google Chrome will stop displaying the security indicators such as the green padlock and/or green address bar for any certificates using the now outdated SHA-1 algorithm. Luckily, there is a FREE and easy way… Read More

Microsoft Security Advisory: Vulnerability in Microsoft OLE: KB 3010060

Microsoft recently announced Microsoft Security Advisory 3010060. Microsoft discovered a vulnerability in all supported releases of Microsoft Windows which could allow your entire system to be taken over if a user opens any specifically designed Microsoft Office file that contains an OLE (Object Linking and Embedding) object. Among operating systems… Read More

SSL 3.0 POODLE Vulnerability

Have you ever used Wi-Fi in a coffee shop, restaurant, or public areas? In a perfect world we could browse the web freely and securely without any worries that the personal information we are sending does not end up in the wrong hands. Unfortunately, we don’t live in a perfect… Read More

Shellshock (CVE-2014-6271) Bash Vulnerability Security Advisory

Shellshock is a nickname for a bug in the BASH (Bourne Again Shell) command-line also known as a shell. Due to it being widely adapted as a default command-line interpreter, many operating systems including Linux, Unix, BSD and Apple’s OSX can be vulernable to an attack.  We are working with… Read More

The Heartbleed Bug: What It Means To You?

Chances are, you’ve already heard about the recent discovery of what’s being called the “Heartbleed” bug in OpenSSL.  Basically, this is a vulnerability that existed in OpenSSL for around 2+ years.  The vulnerability was basically a gap where encrypted information could potentially be leaked out to hackers.  It is important… Read More

Contact to get a head start

Email Us Call » 858.368.4545

  • Designed by RedOrum