by Miguel Morales | Nov 2, 2020 | IT Support
Honeypots have been a part of the cybersecurity world for decades. This is because they offer real-world data on the types of threats companies face, and can be a powerful research tool for identifying specific threat vectors. Rather than relying on general passive...
by Miguel Morales | Nov 1, 2020 | IT Support
Cross Site Scripting (XSS) is one of the most popular and vulnerable attacks known to all advanced testers. It is considered one of the riskiest attacks for web applications and can also have damaging consequences. XSS is often compared to similar client-side...
by Miguel Morales | Oct 30, 2020 | IT Support
Did you know that QR Codes can represent a cybersecurity risk? Yes, those codebar-like squared tags are harmful to your business, when implemented wrong. Although they can be powerful when done correctly (they’re used to distribute a vast number of marketing...
by Miguel Morales | Oct 29, 2020 | IT Support
Virtual machines have gotten a big name for themselves in the IT field, as well as on a more casual and business side. In short words, virtual machines let you open and execute apps on systems that otherwise you couldn’t. For example, run Windows on a Mac or Linux...
by Miguel Morales | Oct 25, 2020 | IT Support
Reports of +500,000 Call of Duty accounts hacked started to come over the surface by several online COD players. Gaming company “Activision” declined the claims. It’s not clear who it was the first person who flagged the breach, but the rainstorm came...