Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.

Development

We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

1TB of Data Stolen from International Tech Firm

Hackers stole a terabyte of data from a Miami-based tech firm and leaked some data online including full credit-card information, passports, bank statements and financial documents on a Russian hacker forum. Intcomex, a very large value-added reseller which provides technology products and services in Latin America and the Caribbean was the victim. The leaks occurred on Sept. 14 and Sept. 20, when hackers dumped it in two parts on the forum. The data was stolen as the result of a ransomware atta ...

Zero-Click Kernel Bug in Linux-Based IoT Devices

There is a high-severity flaw in BlueZ, the Linux Bluetooth protocol stack that provides support for Bluetooth protocols in Linux-based internet of things (IoT) devices. According to Google, the vulnerability affects Linux kernel versions older than 5.9 that support BlueZ. BlueZ is an open-source project distributed under GNU General Public License which features the BlueZ kernel that has been part of the official Linux kernel since version 2.4.6. ...

Apple T2 Chip Flaw Allows Root Access

MacOS operating systems with T2 security chips could give hackers root access. The flaw exists in the T2 chip, which is the second-generation version that provides increased security. T2 secures its Touch ID as well as providing the foundation for encrypted storage and secure boot capabilities. Macs sold between 2018 and 2020 have the embedded T2 chip and are vulnerable. ...

Paying Ransomware May Be Illegal

The U.S. Treasury Department is warning that individuals or businesses making ransomware payments may be violating anti-money laundering and sanctions regulations. The warnings came in two advisories, one from the Financial Crimes Enforcement Network (FinCEN) and the other from the Office of Foreign Assets Control (OFAC). FinCEN addressed companies that provide services to victims of ransomware attacks, including digital forensics and incident response companies and cyber insurance companies tha ...