To TheMoon with Linksys

Have a Linksys router? You’ll want to read this. Technical details about a vulnerability in Linksys routers that’s being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models. Over the last week security researchers from the SANS Institute…

The top 5 ways to avoid getting hacked while visiting Russia (or anywhere, for that matter)

Yesterday (Feb 5 2014) NBC News ran a story claiming that if you bring your mobile phone or laptop to the Sochi Olympics, it’ll immediately be hacked the moment you turn it on. The story was fabricated. After further examination we found that the technical details of the hack didn’t make sense. Really, the exploit…

Dropbox: Taming the Wild West

A modern-day Wild West can be found in the slapdash enterprise use of cloud-based file storage and sharing. But new security technologies puts user-managed security atop those platforms without burdening the IT department with lots of administrative overhead. “Transparent layers of encryption with enterprise-owned and managed private keys can now be implemented on top of…

Java Critical Update End User Instructions

A significant security vulnerability with Java (software that is installed on most computers) was recently discovered. We are advising all our customers to update their Java to the most recent update, which has fixed the security hole. How to update Java on your computer:  https://www.corp-infotech.com/resources/java-update-end-user-instructions/ Please follow the instructions immediately to ensure your computer isafe.…