• Call Today: (615) 646-2121
  • Hours: Mon - Fri 8 AM to 5 PM
  • 120B Seaboard Lane Franklin, TN 37067

Month: June 2016

If you use a Cisco firewall or router to protect your digital assets, it’s time to check your equipment. Cisco recently released a security advisory that covers three of its popular, widely used pieces of equipment: The RV 110W Wireless-N VPN Firewall The RV 130W Wireless-N Multifunction VPN Router The RV 215W Wireless-N VPN Router

Online security company Check Point Software Technologies has discovered a flaw in Facebook’s chat app that allows hackers to log in and change the content of chat messages (individual messages or entire chat streams) without notifying users that changes have been made. The exploit is accomplished by finding the unique identification number associated with each

Recently, I was talking to a friend of mine who owns a small business. He was me telling of some troubles he was having with a few of his clients. Before I go on, I must tell you that I have also been a small business owner in the past. One of the businesses I

The push toward ever greater miniaturization has been present in the technology industry from the very beginning. Computers that once occupied whole rooms got small enough to fit onto any available desktop. PCs gave way to laptops, which are currently giving way to a variety of handheld devices, and still, the drive to make equipment

Your employees are both your company’s greatest asset and your biggest potential security risk. In a recent study conducted by Experian Data Breach Resolution and Ponemon Institute, it was found that 55% of companies surveyed have experienced one or more security incidents where the catalyzing event was a negligent or malicious employee. The study also

If you’re one of the millions of users with an Android phone, then you already know there are a couple of different ways you can find it if you happen to misplace it. You can use the built-in search feature, or the Device Manager app. As of now, Google has rolled out an additional option,

Security researchers from Cisco’s Talos Group have discovered a huge and disturbing spike in spam emails containing a widely used ransomware called Zepto. In fact, the team has uncovered 137,731 such emails over just a four-day period, containing more than three thousand unique samples. These emails use simple social engineering tricks to give them a

Have you been noticing “strange” search results when you’re surfing the web? Have your search results been taking longer than usual to appear? You may have been infected by a new, very clever bit of malware known as Redirector.Paco. There are actually two flavors of this malicious software, the key differences between them is that

What percentage of total internet traffic would you estimate that bots (non-human visitors) account for? Twenty percent? Thirty percent? Unfortunately, according to data released by DeviceAtlas, a company that makes software to detect the kinds of devices web visitors are using, reveals that non-human sources account for a staggering 48% of all web traffic. This

If you haven’t yet heard of “KeySweeper,” you have a new threat to be on the lookout for. The KeySweeper device is built with off the shelf, Arduino components. These can be programmed for a variety of purposes, but the hacking community is using them as stealthy keylogging devices. By all outward appearances, the device