by bct2mastertemp | May 25, 2019 | Blog
Do you use Dell equipment at home or in your office? If so, then the recent discovery made by independent security researcher Bill Demirkapi should give you pause. Recently, Mr. Demrikapi discovered a flaw in the company’s SupportAssist utility that comes...
by bct2mastertemp | May 24, 2019 | Blog
This year’s Open Source Security and Risk Analysis Report analyzed the anonymized data of more than 1,200 commercial codebases from 2018. According to the report, managing open source risk continues to pose a significant challenge for industry. The Synopsys...
by bct2mastertemp | May 23, 2019 | Blog
Jeremiah Fowler, a researcher with Security Discovery recently found an unprotected Elasticsearch databased owned by a company called SkyMed on the internet. According to his findings the database was configured such that it was open and visible to any browser. This...
by bct2mastertemp | May 22, 2019 | Blog
Tech giant Google recently unveiled the next step in its plan to put more power in the hands of users when it comes to their own data. The most recent change involves the introduction of a new auto-delete feature tied to your Google account. It will allow you to set...
by bct2mastertemp | May 21, 2019 | Blog
There’s a new scam afoot that involves using Google Ads. We’re frankly surprised that it’s working, but apparently, it’s drawing some unsuspecting customers in. It appears to be an organized campaign. The unknown scam artists are creating ads...