Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.

Development

We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

Millions of Peripherals Open to Cyberattacks

Firmware can be burned into the integrated circuit or the component may have its own flash memory where firmware is stored. Firmware can also be provided by the operating system at boot time. Regardless of the approach, firmware is used as the device-specific operating system for the peripherals, and can provide hackers many ways to hack into a system. Many peripheral devices do not verify that firmware is properly signed with a public/private key before running the code. ...

WordPRess Plugin Bug Affects 700,000 sites

The vulnerability, which does not yet have a CVE number, affects GDPR Cookie Consent version 1.8.2 and below. The developer was notified of the critical flaw and the GDPR Cookie Consent plugin was removed from the WordPress.org plugin directory pending a review. The flaw is the result of improper access controls in an endpoint used by the WordPress plugin's AJAX API. The endpoint is the “_construct” method within the plugin, used for initializing code for newly created objects. Once actio ...

Intel Patches Flaw in Security Engine

It's not the first flaw found in CSME. In November, a critical flaw in CSME was patched that could allow escalation of privilege, denial of service or information disclosure. Another critical flaw discovered in May could allow an authenticated user to enable escalation of privilege over network access in CSME. ...

Google Chrome Will Block File Downloads

Google started to label HTTP websites with an "insecure" warning in the navigation bar from Chrome 68. Just because websites use an HTTPS connection does not guarantee that they are safe from all threats. Phishing landing pages can easily use SSL certificates. Similarly, HTTPS websites can still serve up images, scripts or other file types that are downloaded using the less-secure HTTP connection. ...