Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.

Development

We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

Another Intel Chip Flaw Exposes Encryption Keys

According to Positive Technologies, a Russian cybersecurity firm, a security vulnerability in Intel chips allow encrypted file access. The flaw also gives hackers the ability to bypass copyright protection for digital content. Positive Technologies found that the vulnerability ( CVE-2021-0146 ) is caused by a debugging functionality with excessive privileges. According to Intel, the flaw allows activation of test o ...

BotenaGo Malware Can Exploit Millions of IoT devices and Routers

A new malware has been detected that is written in Google's open-source programming language Golang has the potential to exploit millions of routers and IoT devices. It was discovered by researchers at AT&T AlienLabs. BotenaGo can exploit more than 30 different vulnerabilities to attack a target according to security researcher Ofer Caspi. The malware works by creating a backdoor to the device. It then waits to receive a target to attack from a remote operator through port 19412 or from anothe ...

Linux Kernel Bug Allows Remote Control

A critical, heap-overflow vulnerability in the Transparent Inter Process Communication (TIPC) module of the Linux kernel can lead to remote code execution and system compromise. TIPC is a peer-to-peer protocol used by nodes within a Linux cluster to communicate with each other in an optimized way. It allows various types of messages used for different purposes. According to SentinelLabs, the bug is in a message type that allows nodes to send cryptographic keys to each other. When received, the ...

Fake Google Chrome update Bypasses Windows User Account Control

There is no better way to get a payload onto someone's device than through a program that nearly everyone has installed like Google Chrome. Infostealer malware, masquerades as a legitimate update to Google Chrome so that sensitive data or cryptocurrency can be stolen from the victims' machines. The Malware is delivered through a compromised website on Chrome browsers can bypass User Account Controls to infect systems. Hackers behind a newly identified malware campaign are targeting Windows 10 ...