Cybersecurity Framework by NIST(National Institute of Standards and Technology)

NIST Cybersecurity framework pdf The Framework Core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover. This Framework is designed to protect critical infrastructure of the United States (utilities, police, fire, and other government functions) Small business owners can learn some things as to what to do in the primary function of the … Read more

New Internet Explorer vulnerability Microsoft confirms

This is considered  client side vulnerability. Where the user on their computer can click on a webpage or link using Flash and then the system will be compromised (a malware would kick off and the system will do the master program bidding). this is a good reason why I use Chrome  and firefox to reduce … Read more

New PHP software available – update soon

When PHP says new software is available: http://www.php.net/downloads.php  Then it is a good idea to perform the updates, as security enhancements are done for a reason. You dont want to end up in the headlines. Our more advanced service: Sigma (Σ) is the one to check if you have old software running

Linksys E1200 vulnerable – needs patching

Internet Storm Center has  captured the Linksys E1200 exploit. This is another reason to patch your systems, and if you don’t the bad hackers out there will use your machine for their ends. A full Packet Capture of the exploit has a link in ISC in case you want to review.