by Ophtek, LLC | Jan 22, 2015 | Network, Security, Uncategorized
Why do hackers use remote code execution as a malicious attack on businesses? Here we’ll explain what remote code execution is and why most malware uses it. Remote execution attacks are very real and should not be taken lightly. This is mainly due to the damage...
by Ophtek, LLC | Jan 20, 2015 | Uncategorized
The Sony data breach in late 2014 has caused embarrassment towards their own top executives and employees. Here is a timeline of the Sony hacking events. Here’s the timeline of the 2014 Sony Pictures Cyber-attacks: November 24 Early morning at Sony Pictures...
by Ophtek, LLC | Jan 5, 2015 | Security
If you use Internet Explorer as your web browser, pay close attention to a recent Zero-Day vulnerability CVE-2014-8967 found allowing remote code execution. Out of the various web browsers available to download, Internet Explorer is often the most vulnerable for...
by Ophtek, LLC | Jan 2, 2015 | Backup and Recovery, hardware
Aside from backups and security, protecting your servers and workstations from power surges, thunder storms and power outages helps avoid costly downtime. You may have wondered if a UPS (uninterruptable power supply) and Surge protectors are necessary and worth the...
by Ophtek, LLC | Dec 29, 2014 | Security
The sophisticated Wiper malware which was launched against Sony Pictures does exactly what it sounds like: wipes anything and everything from systems. “Wiper” uses a malicious set of attacks: [rockthemes_list font_awesome_icon_class=”fa-gear”...