About Us | Contact Us
View Cart
Archive for 'Software News' Category

Autopsy of the SolarWinds Hack Update

By Tanvee Dhir - Last updated: Monday, February 22, 2021

 A Timeline Update as of 02/22/21 An update to our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We have decided to leave the original article as it was originally posted and to update this post with any changes that have been made. You can see […]


Autopsy of the SolarWinds Hack

By Tanvee Dhir - Last updated: Monday, February 1, 2021

A Timeline as of 01/24/2021 Our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We are leaving this article as is, but for any updates to the timeline, check the Autopsy of the SolarWinds Hack Timeline Update article!      – Vigilize Introduction: As the managing […]


T7: The Trend of Trends 2021

By Vigilize - Last updated: Monday, January 25, 2021

Top 7 Trend Articles of 2021. . .  . . .For ISOs of Small Financial Institutions. Welcome to our annual T7 article:  a list of our favorite trend articles from the past year.  Our intent: help you organize your thoughts as your work through your strategic planning process.  We hope reviewing these articles will help you […]


SolarWinds Incident

By Vigilize - Last updated: Tuesday, December 15, 2020

infotex does not use SolarWinds… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As recently reported by major news outlets there is currently an ongoing attack on SolarWinds Orion network monitoring software builds released between March and June […]


Microsoft Discontinues Support For SHA-1

By Vigilize - Last updated: Monday, March 4, 2019

Known to be vulnerable since 2005, the algorithm will be phased out over the next several months… An article review. Things can move slowly in the world of cryptography, and for evidence of that one needs to look no further than SHA-1–the hash algorithm introduced in 1995, found to be vulnerable to attack in 2005 […]


Increasing Complexity Threatens Software Stability

By Vigilize - Last updated: Friday, November 17, 2017

As lines of code continue to replace humans and physical devices, quality control is essential…and often overlooked. An article review. Looking back over the last decade or two it is easy to see how computers have changed physically as they shrank in size, spreading to our pockets and beyond, but another change was going on […]


When You Accidentally Go Open Source

By Vigilize - Last updated: Monday, July 24, 2017

32 TB of Windows 10-related source code is now available, for better or for worse… An article review. Releasing the source code for a project has been a common practice among some developers for decades now–proponents say allowing any interested parties to view the code makes for safer systems, preventing sneaky back doors and unintentional […]


Windows Susceptible to FREAK Attack After All

By Vigilize - Last updated: Sunday, March 22, 2015

An article review. Microsoft admits that Internet Explorer is vulnerable to HTTPS hack Earlier this month, Microsoft announced that any Windows computer running any version of Internet Explorer is vulnerable to a FREAK attack. Now the FREAK vulnerability has been around for years; however, it was believed to only affect certain browsers and devices, like […]


The American Monkey Trap

By Dan Hadaway - Last updated: Friday, March 6, 2015

Coming Soon To (or is it from) a Frustrated User Near You! An article about how we 21st Century Americans have been taught to tolerate technologies that do not work. And how that tolerance alone substantially increases risk. And about how we do NOT have to use technology if we can’t find the time to make it “sing.”


Google Updates Chrome to Restore Browser After Microsoft Blunder

By Vigilize - Last updated: Wednesday, October 5, 2011

Google has released updated versions of both the stable and beta versions of its Chrome browser to address an issue that caused Microsoft antivirus products to identify the browser as malware and in some cases, delete the chrome.exe file from users’ computers.