online-shopping 1000x400
08 Dec 2014

How to protect your information when shopping online over the holidays

Yes, it’s that time of year again – the holidays.  At or near the top of most people’s to-do lists during the holidays is finding the perfect give for a loved one or friend.  Businesses do everything they can to bring shoppers to their store, from Black Friday and Cyber Monday sales

02 Dec 2014


If you own or manage a web server, you need to know about a recent vulnerability identified by the Dutch security firm, Fox-IT.  This vulnerability involves embedding malicious software into add-ons for popular content management systems such as WordPress, Joomla, and Drupal. This exploit is referred to as a backdoor vulnerability, which is

22 Nov 2014

Cyber Threat Alert – “Masque Attack” Affects iOS Devices

One of the most recent vulnerabilities facing cyber systems today is called the Masque Attack.  This vulnerability, which affects Apple iOS systems, was identified by the United States Computer Emergency Response Team (CERT), which is part of the U.S. Department of Homeland Security.  CERT released a formal

flashlight app malware
12 Nov 2014

Is Your Flashlight App Doing More Than Lighting Up Your Room?

Ever needed to find your keys in the dark? Well, there’s an app for that.  But beware, that flashlight app for your phone may be doing more than shedding some light in a dark room.  In fact, if you have downloaded one of the popular flashlight apps from the Google

google chrome
11 Nov 2009

Google Chrome’s Blended Browser Threat Could Steal Files from your Computer

With this article I hope to make you aware of a vulnerability with Google Chrome version, and earlier versions.  As I’m sure you know, Chrome is Google’s solution for a web browser.  Chrome has grown in popularity over the years because of its speed and simplicity, and often ranks' 0
11 Nov 2009

Millions of PDF invisibly embedded with your internal disk paths

Today, more than ever, anyone can find information they need by using a few mouse clicks on the Internet.  This ease-of-access comes at a price though, namely security. It is the goal of cyber security professionals everywhere to balance the ever increasing appetite for more information and more access with' 0