Category Archives: Security

Apple’s Response to Meltdown / Spectre Flaw

Jan
8
2018

Apple has released updates to address recent security flaws; Meltdown and Spectre.   From US-CERT: “Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities to obtain access to sensitive information. NCCIC/US-CERT encourages users and administrators to review Apple security pages for the following products and apply the […]

Meltdown and Spectre: 2018’s 1st Major Security Incident

Jan
4
2018

We are bringing in the new year with two of the most serious security flaws ever: Meltdown and Spectre. Google researchers discovered vulnerabilities in both Intel and AMD semiconductors. The root cause resides in the fundamental architecture of the chips. What are they? Meltdown allows for a program to access the Operating System’s central memory, […]

FortiClient SSL VPN & Antivirus Client Security Flaw

Dec
14
2017

Please update your FortiClient software. (Instructions Below) FortiClient SSL VPN software has a security flaw that allows other users to decrypt the login information. In the event of a stolen laptop’s drive could also be exploited allowing the access to your company’s’ Internal Network. Fortunately, FortiNet has provided an updated version of FortiClient and I […]

21st Century Blackmail

Jul
2
2017
ransomware

With all the news about Cyberweapons and Cryptoware, all the attacks with Petya and Wannacry. It’s important to be educated and prepared for these types of attacks. Here are some quick tips.   1) What is Ransomware? Ransomware has one goal: make money. It’s the biggest technology crime in today’s world, and continues to grow […]

Software Updates: Why you should care.

Jun
22
2017

  Every piece of software has security holes. It’s a product of people wanting to break or “hack” into software. Be it financial gain, malicious intent, or even by accident; new security vulnerabilities are constantly being discovered. You can think of vulnerabilities as a “hole” in your software. Once found, these holes can be used […]