by Nick Popovich | Dec 16, 2015 | Security
TL;DR: Millions of domains on the web use wildcard DNS records as “catch all’s” for all subdomains of their parent domain. When combined with a Cross-Site Scripting (XSS) flaw, this allows remote attackers to use these sites to launch convincing XSS...
by Jeff Hughes | Apr 2, 2015 | Security, Software
2014 was a big year for security breaches. Sony, Target, Home Depot, and even Goodwill were severely compromised, leaking an unknown amount of customer information and critical corporate data, some of which being exploited using weak passwords, unpatched Windows...
by Jeff Hughes | Apr 1, 2015 | Security
There are many ways to transmit information over the Internet from one place to another and all different systems use all different mechanisms and protocols to transmit data from point A to point B. Some are secure and some are less secure (or usually not at all). In...
by Jeff Hughes | Mar 17, 2015 | Security, Software
Believed to first have been identified in 2013, there’s a new kind of malicious threat floating around the web that continues to pose a risk to business data: ransomware. Ransomware is a type of malicious application that uses common attack vectors (phishing...
by Jeff Hughes | Mar 18, 2014 | Security
As many of our customers know, Windows XP is coming up on End of Life on April 8th, 2014. For many businesses we serve, it won’t be a problem – not even a blip in the radar. For others, it means migrating their remaining XP systems to more stable...
by Jeff Hughes | Jan 17, 2012 | Security
Wifi is everywhere these days. It’s rare to hear of a computer or device coming to market without wireless capabilities that make networking with other home or business assets a breeze. Wireless can also be great for extending network coverage to places that...
Recent Comments