Blog

Important Microsoft Update:

On July 21 2015, Microsoft discovered a massive security breach. They discovered a weakness within the OpenType fonts. This weakness is exploited via documents or webpages that contain malicious OpenType fonts. The breach is occurring in Windows and Adobe type manager library and how these libraries handles these fonts. If this flaw is exploited,...
Read more

Adobe Zero-Day Exploit:

As of July 11th 2015, a second major weakness has been found in Adobe Flash player. This is a programming flaw. This exploit is now online and well known. This means that hackers not only know of this, but they can begin planning a way to exploit the weakness called CVE-2015-5122. What does this weakness...
Read more

Blacklisting Bots:

A major problem on the internet today is bots or computer robots. These Bots affect major data centers. They add a significant amount of no traffic and it is complete autonomous. All it takes is someone setting up the programs and letting them run by. Major companies such as Google, Yahoo, and Facebook are now...
Read more

HIPAA Security Tips – Privacy Screens

There are various ways to protect ePHI. Some of these methods require complex technology, while others methods are simple things like protecting your computer monitor from prying eyes. One of the easiest ways to protect your computer screen is through the use of privacy screens. These screens the reading radius of your screen...
Read more