Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.

Development

We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

New Lazarus Group MacOS Malware Found

Lazarus Group has been known to target users or administrators of crypto-currency exchanges. Their method of infecting such targets is through fake crypto-currency company and trading applications. The newly discovered attack follows a similar pattern, with the installer being hosted on a website called unioncrypto.vip that advertises a cryptocurrency arbitrage trading platform but provides no download links. ...

Google Fixes DoS Flaw in Android

The most severe issue is a critical security vulnerability in the Framework component that could enable a remote hacker to cause a permanent denial of service. . That DoS flaw has been addressed for devices running on versions 8.0, 8.1, 9 and 10 of the Android operating system. The other flaws existed in Android's Media framework. This framework includes support for playing common media types, so that users can easily utilize audio, video and images. Android devices running on operating systems ...

Google Announces $1M+ Bounty

The expansion of the program focus on Google's own technology rather than the greater ecosystem, with the company offering a significant prize for hackers to test the security of its Titan security chip on it's forthcoming versions of Android. ...

TrickBot Goes After SSH Keys

The password grabber and some other TrickBot modules send stolen data using unencrypted HTTP over TCP port 8082 to an IP address used by TrickBot The URL in the HTTP POST request ends with the number 81. This number is used in URLs generated by TrickBot's password-grabber module. ...