720-891-1663

Millions Of Records Exposed By Poorly Written Apps

App developers, like all software developers, like to integrate existing code to reduce their workload and their time to market. Unfortunately, that does not mean that developers will follow the best practices in using that existing code. According to a presentation at Black Hat Europe this week, developers who use BaaS or Backends as a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Malvertising

Malvertising is the term that describes taking advertising that appears on legitimate web sites and turning it into weapons. In almost all cases, the web sites involved have no knowledge of what is going on.  Web sites buy ads from large ad networks such as Google and AOL.  Those ad networks sign up advertisers so […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Are Your Systems As Secure As The Government’s? Probably More Secure!

Two new studies this week give us some insight into how government at all levels is doing at protecting their – excuse me – our information. First the Feds.  Here are some disturbing stats from a MeriTalk/Palo Alto Networks study: Federal IT Managers estimate at 44% of the endpoints that access agency network are at […]

Continue reading → [DISPLAY_ACURAX_ICONS]