720-891-1663

Hidden Backdoor Found In Another Chinese Network Gateway

The headline reads Hidden Backdoor Found in Chinese-Made Equipment.  Nothing New! Move Along! That headline by itself should scare you. Researchers found a hidden backdoor in a Double Technology GSM gateway used by telephone companies and VoIP providers.  DblTek is based in Hong Kong. According to the security firm Trustwave, there is an account called […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Cisco Webex Plugin Vulnerability – Part of a Much Bigger Issue

Recently Cisco published a critical vulnerability alert regarding their Webex browser plugin.  While the plugin vulnerability, which affected Firefox, Chrome and Internet Explorer, was very serious it points to a much bigger issue. First the plugin issue. The bug affects Webex Meeting Server, Meeting Center, Event Center, Training Center and Support Center.  Due to a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Application Security – The Neglected Threat

When companies like Microsoft or Oracle develop software, they have massive teams who’s only job is to try and find bugs in the software.  They also have made significant investments automated tools to help with software quality assurance.  Still Microsoft usually patches 10-20 new bugs month after month.  Oracle often patches 100 bugs a quarter. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

What Does Mike Pence’s Use of A Personal Email Account Teach Us?

The Washington Post is reporting that Vice President Mike Pence used a personal email account to conduct government business when he was Governor of Indiana. The Veep says that his use of a personal email account is different than Clinton’s use of a personal email account and I do not want to turn this into […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Stewart International Airport Data Breach Self Inflicted

Stewart  International Airport has a long history.   In 1930 Thomas Stewart convinced his Uncle to donate land for an airport to the city.  In 1939 the U.S. Military Academy at West Point  built the first airfield at Stewart and in 1948 it became Stewart Air Force Base.  In 1970 the State of New York bought […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Application Penetration Testing is Critical

Application penetration testing or pen test is more critical than ever and news today is only the most recent example of why. Spiral Toys makes a line of Internet connected teddy bears (aka smart bears, I guess) that allows parents and children who were physically apart to share personal messages. Unfortunately for the purchasers of […]

Continue reading → [DISPLAY_ACURAX_ICONS]