Red October introduces advanced SpearPhishing techniques to cyber-espionage

During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and scientific research organizations, gathering data and intelligence from mobile devices, computer systems and network equipment. Corporate Information Technologies (CIT) has also observed these infiltrations in commercial organizations, often unabated. “A layered cyber defense system that is capable…

Details

Learn about the Android Nexus

When it comes to mobile devices, users really only have the choice between a closed system with three incredibly popular devices, or an open system with hundreds of phones. For those who want choice, that system is Android. When researching devices, you are bound to hear about Android’s Nexus line, but might wonder, “what exactly…

Details

Java Critical Update End User Instructions

A significant security vulnerability with Java (software that is installed on most computers) was recently discovered. We are advising all our customers to update their Java to the most recent update, which has fixed the security hole. How to update Java on your computer:  https://www.corp-infotech.com/resources/java-update-end-user-instructions/ Please follow the instructions immediately to ensure your computer isafe.…

Details