You Don’t Have Much Time To Stop An Attack

You Don’t Have Much Time To Stop An Attack

You Don’t Have Much Time To Stop An Attack How much time do you have to secure your systems from a zero-day infection? Would it surprise you to learn that it is less than 72 hours? It is true. Locking down your systems from new vulnerabilities is essential. But just...

Routers and Firewalls with Broadcom Chipsets Are Vulnerable

Routers and Firewalls with Broadcom Chipsets Are Vulnerable Have you heard of the router/firewall critical vulnerability called Cable Haunt? Well, for 200 million worldwide users, this could soon be a nightmare come true. Cable Haunt allows a hacker to compromise the...
Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program   McAfee anti-virus software has a very serious vulnerability in its code execution.  No matter what edition of McAfee software you are using because all editions are vulnerable. The vulnerability allows malware to...
Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security   The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Fortune 500 Companies and Government Agencies Still Using Vulnerable Anti-Virus Products

Fortune 500 Companies and Government Agencies Still Using Vulnerable Anti-Virus Products

Fortune 500 Companies and Government Agencies Still Using Vulnerable Anti-Virus Products It has been two years since a Binding Operational Directive was issued by the Department of Homeland Security to all Federal executive branch departments and agencies directing...