Enterprise App Development

We spent years in Enterprise App Development sphere that spans custom application for wall street to mobile apps. Our years of experience has let us to develop some of the most sophisticated trading systems still in use today. We have applied our custom application experience to our customers; including mobile, internet, accounting and server applications.

Our Portfolio

  • All
  • Enterprise Apps
  • Web Apps

ABS Structuring System

Creates and manages asset groups for capital structure

Centipede

Web project document management system with version control

Tape Cracker

Mortgage tape-cracking web application

Partner2000

Web accounting app for food distribution companies

Real World

Custom Accounting web application for fabric distribution

Android Ransomware Activates with the Home Button

A new variant of MalLocker locks up mobile devices with a ransom note when a user hits the Home button. According to researchers from Microsoft, MalLocker is spread through website downloads and on online forums. The new variant is an advanced malware that manages to avoid detection. Android ransomware differs from its desktop counterparts by blocking access to the device with screens containing ransom notes that prevent any action. It doesn't encrypt anything. In MalLocker's, the overlay screen ...

Ryuk Encrypts Entire Network in a Matter of Hours

The Ryuk hackers can completely encrypt an entire network in a matter of hours. All it takes is as little as 2 hours to go from an email being sent to full encryption of systems. The speed is partially the result of the group using the Zerologon privilege-escalation bug after the initial phish. The Zerologon vulnerability allows an unauthenticated hacker with network access to a domain controller to completely compromise all Active Directory identity services, according to Microsoft. It was patc ...

GravityRAT Returns Targeting Android and MacOS Too

In 2018, researchers at Cisco Talos published a report on the spyware GravityRAT, used to target the Indian armed forces. The Indian Computer Emergency Response Team (CERT-IN) first discovered the Trojan in 2017. It's authors are believed to be hacker groups based in Pakistan. According to researchers, the campaign has been active since at least 2015, and previously targeted Windows machines. Kaspersky researchers found updated GravityRAT code. Further investigation confirmed that the group behi ...

IoT Devices Are Responsible Almost One Third of all Infections

The COVID-19 pandemic, along with an increase in the number of connected devices, have led to a surge of IoT infections observed on wireless networks. Cameras, refrigerators and other internet-of-things (IoT) devices are targets for hackers. New research shows a 100 percent increase in IoT infections observed on wireless networks. IoT devices are now responsible for almost 33 percent of all infections observed in mobile and Wi-Fi networks, up from 16 percent in 2019. ...