Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.

Development

We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

15 Billion Credentials Currently For Sale on Hacker Forums

Hackers steal these credentials in a number of ways, including phishing, credential-stealing malware and credit card skimmers. it's never been easier to steal sensitive data from user accounts. Brute-force cracking tools and account checkers are available on hacking marketplaces for about $4, as well as new service options that allows criminals to "rent" an identity for less than $10. The number of credentials available is staggering. ...

Lucifer Malware Propagates Itself

Lucifer is a new class of cryptojacking and DDoS malware variant that leverages old vulnerabilities to spread and perform malicious activities on Windows platforms. The vulnerabilities targeted by Lucifer include Rejetto HTTP File Server, HTTP File Server, Oracle Weblogic, Apache Struts, and Microsoft Windows. ...

Serious Bugs in Nvidia Graphics Drivers

One of the vulnerabilities, CVE-2020-5962, exists in the Nvidia Control Panel, which provides control of the graphics driver settings as well as other utilities installed on the system. The flaw could allow a hacker with local system access to corrupt system files, which could lead to DoS or escalation of privileges. ...

EvilQuest Mac Malware

EvilQuest samples have been found in pirated software, which are being shared on BitTorrent file-sharing sites. While this method is unsophisticated, it is successful. Researchers found ransomware pretending to be a Google Software Update package. They also inspected a ransomware sample that was being distributed through a pirated version of Mixed In Key 8, which helps DJs mix their songs. Researchers also found it in pirated version of Little Snitch, whichis a legitimate, host ...