• Call Today: (615) 646-2121
  • Hours: Mon - Fri 8 AM to 5 PM
  • 1616 Westgate Circle Suite 359 Brentwood, TN 37027

Month: February 2017

If you’re a music lover and you’ve been to the website of the annual California music festival Coachella, then you are at risk. The entire Coachella database was recently found for sale on the Darkweb. It contains email addresses, passwords and in many cases, IP addresses and other personal information of everyone who has registered

WordPress is the reigning King of the Content Management Systems, and by extension, the king of much of the internet. More people use the platform than any other, and with good reason. It’s an enormously flexible platform that will allow you to build any kind of website you want with ease. With creative use of

It’s an oldie but a goodie, and an attack vector that Windows users have seen since the late 90’s. Macros. These are essentially shortcut codes that Microsoft Word and other applications use to automate certain processes. They’re written in Visual Basic, and unfortunately, in addition to making your life easier in MS Office, they can

If, for some reason, you’re still running Windows XP or Vista , you probably already know that it’s well past time to upgrade. Microsoft officially ended support months ago, even for critical updates, which means that your computer is essentially a ticking bomb. Sooner or later, a hacker is going to find it, and when

Remember back in the early 2000’s when Nokia was the king of the cellphone market? Well, if you’re feeling nostalgic for those days, there’s (potentially) good news on the horizon. At a recent tech conference in China, the Finnish company announced the release of the “NSeries.” The NSeries is a new generation of smartphones that

Kaspersky Labs originally discovered “fileless malware” back in 2014, but it wasn’t until this year that it became mainstream. Now, the company is reporting that more than 150 banks around the world may be infected. The problem with this kind of attack is that, as the name implies, it does not rely on files being

Over the weekend, a hacker who goes by the name Stackoverflowin performed a public service. Of course, in the process of doing so, he terrified and confused a lot of people. Having researched a printer vulnerability, he wanted to help get the word out and have a little fun at the same time. So, he

JavaScript is hands down the tool of choice of hackers who are interested in inserting malicious code onto a user’s device. Most commonly, scripts are embedded in compressed (zipped) files, and when unpacked, install on the user’s machine without him or her even being aware of what’s going on. The problem has reached such epic

ReRAM is coming to a computer manufacturer near you, and soon. If you haven’t heard of this technology yet, you’re not alone, but it is one of the most exciting developments in the world of processors and chipsets in literally years. Under the hood, memory is used as a storage device, and processors do the

It hasn’t been a good time for Netgear. In recent months, security researchers across the industry have identified several critical security flaws that could leave your network exposed and vulnerable to attacks. The most recent were discovered by the security firm Trustwave which reported their findings to Netgear. These flaws revolve around the ability to

Tech Company Nashville

is a proud member of