Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.

Development

We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

Android Ransomware Activates with the Home Button

A new variant of MalLocker locks up mobile devices with a ransom note when a user hits the Home button. According to researchers from Microsoft, MalLocker is spread through website downloads and on online forums. The new variant is an advanced malware that manages to avoid detection. Android ransomware differs from its desktop counterparts by blocking access to the device with screens containing ransom notes that prevent any action. It doesn't encrypt anything. In MalLocker's, the overlay screen ...

Ryuk Encrypts Entire Network in a Matter of Hours

The Ryuk hackers can completely encrypt an entire network in a matter of hours. All it takes is as little as 2 hours to go from an email being sent to full encryption of systems. The speed is partially the result of the group using the Zerologon privilege-escalation bug after the initial phish. The Zerologon vulnerability allows an unauthenticated hacker with network access to a domain controller to completely compromise all Active Directory identity services, according to Microsoft. It was patc ...

GravityRAT Returns Targeting Android and MacOS Too

In 2018, researchers at Cisco Talos published a report on the spyware GravityRAT, used to target the Indian armed forces. The Indian Computer Emergency Response Team (CERT-IN) first discovered the Trojan in 2017. It's authors are believed to be hacker groups based in Pakistan. According to researchers, the campaign has been active since at least 2015, and previously targeted Windows machines. Kaspersky researchers found updated GravityRAT code. Further investigation confirmed that the group behi ...

IoT Devices Are Responsible Almost One Third of all Infections

The COVID-19 pandemic, along with an increase in the number of connected devices, have led to a surge of IoT infections observed on wireless networks. Cameras, refrigerators and other internet-of-things (IoT) devices are targets for hackers. New research shows a 100 percent increase in IoT infections observed on wireless networks. IoT devices are now responsible for almost 33 percent of all infections observed in mobile and Wi-Fi networks, up from 16 percent in 2019. ...