by Ophtek, LLC | Feb 4, 2015 | Security
Google publicly disclosed a Windows 8.1 bug that allows administrator access to PCs. The disclosure highlight a vulnerability affecting millions of users. This has left Microsoft outraged, especially considering that they were about to release a patch for it. The news...
by Ophtek, LLC | Jan 30, 2015 | Security
To stay safe from infections, we’re going to look at how viruses spread over USB thumb drives and how you can protect yourself and your business. Why would anyone deny the comfort level enjoyed with using USB thumb drives to conveniently transfer data? Beneath it all,...
by Ophtek, LLC | Jan 22, 2015 | Network, Security, Uncategorized
Why do hackers use remote code execution as a malicious attack on businesses? Here we’ll explain what remote code execution is and why most malware uses it. Remote execution attacks are very real and should not be taken lightly. This is mainly due to the damage...
by Ophtek, LLC | Jan 5, 2015 | Security
If you use Internet Explorer as your web browser, pay close attention to a recent Zero-Day vulnerability CVE-2014-8967 found allowing remote code execution. Out of the various web browsers available to download, Internet Explorer is often the most vulnerable for...
by Ophtek, LLC | Dec 29, 2014 | Security
The sophisticated Wiper malware which was launched against Sony Pictures does exactly what it sounds like: wipes anything and everything from systems. “Wiper” uses a malicious set of attacks: [rockthemes_list font_awesome_icon_class=”fa-gear”...
by Ophtek, LLC | Dec 11, 2014 | Office IT, Security
With more regulatory commissions requiring encryption and privacy being a hot topic, it’s important to understand what encryption is and whether you need it. Encryption is nothing new; in fact, it was used thousands of years ago during the ancient times in...