Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.

Development

We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

Tax Scams Increase as Tax Season Approaches

The attacks are emerging alongside the traditional e-mail based attacks that try to trick users into installing malware that can steal credentials or take control of systems. One of the new target tax scams uses the legitimate TeamViewer remote-control app to do its work. Other email-based attacks this year uses more traditional malware like the Trick banking trojan. ...

Popular WordPress Plugin Flaw is Being Actively Exploited

The flaw allows unauthenticated, remote hackers to execute some administrator functions without checking if they are an administrator. One such function is the capability to wipe the entire database of the vulnerable website, bringing it to its default state and clearing website databases of existing posts and user roles. A hacker could also be logged in as an administrator which would give them complete control over the website. ...

Millions of Peripherals Open to Cyberattacks

Firmware can be burned into the integrated circuit or the component may have its own flash memory where firmware is stored. Firmware can also be provided by the operating system at boot time. Regardless of the approach, firmware is used as the device-specific operating system for the peripherals, and can provide hackers many ways to hack into a system. Many peripheral devices do not verify that firmware is properly signed with a public/private key before running the code. ...

WordPRess Plugin Bug Affects 700,000 sites

The vulnerability, which does not yet have a CVE number, affects GDPR Cookie Consent version 1.8.2 and below. The developer was notified of the critical flaw and the GDPR Cookie Consent plugin was removed from the WordPress.org plugin directory pending a review. The flaw is the result of improper access controls in an endpoint used by the WordPress plugin's AJAX API. The endpoint is the “_construct” method within the plugin, used for initializing code for newly created objects. Once actio ...