Archive for 'Software News' Category
Kaseya Incident
infotex does not use Kaseya… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As you may be aware there was a large ransomware attack recently that leveraged a remote management tool called Kaseya that is used by many […]
Autopsy of the SolarWinds Hack Update
A Timeline Update as of 02/22/21 An update to our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We have decided to leave the original article as it was originally posted and to update this post with any changes that have been made. You can see […]
Autopsy of the SolarWinds Hack
A Timeline as of 01/24/2021 Our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We are leaving this article as is, but for any updates to the timeline, check the Autopsy of the SolarWinds Hack Timeline Update article! – Vigilize Introduction: As the managing […]
T7: The Trend of Trends 2021
Top 7 Trend Articles of 2021. . . . . .For ISOs of Small Financial Institutions. Welcome to our annual T7 article: a list of our favorite trend articles from the past year. Our intent: help you organize your thoughts as your work through your strategic planning process. We hope reviewing these articles will help you […]
SolarWinds Incident
infotex does not use SolarWinds… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As recently reported by major news outlets there is currently an ongoing attack on SolarWinds Orion network monitoring software builds released between March and June […]
Microsoft Discontinues Support For SHA-1
Known to be vulnerable since 2005, the algorithm will be phased out over the next several months… An article review. Things can move slowly in the world of cryptography, and for evidence of that one needs to look no further than SHA-1–the hash algorithm introduced in 1995, found to be vulnerable to attack in 2005 […]
Increasing Complexity Threatens Software Stability
As lines of code continue to replace humans and physical devices, quality control is essential…and often overlooked. An article review. Looking back over the last decade or two it is easy to see how computers have changed physically as they shrank in size, spreading to our pockets and beyond, but another change was going on […]
When You Accidentally Go Open Source
32 TB of Windows 10-related source code is now available, for better or for worse… An article review. Releasing the source code for a project has been a common practice among some developers for decades now–proponents say allowing any interested parties to view the code makes for safer systems, preventing sneaky back doors and unintentional […]
Windows Susceptible to FREAK Attack After All
An article review. Microsoft admits that Internet Explorer is vulnerable to HTTPS hack Earlier this month, Microsoft announced that any Windows computer running any version of Internet Explorer is vulnerable to a FREAK attack. Now the FREAK vulnerability has been around for years; however, it was believed to only affect certain browsers and devices, like […]
The American Monkey Trap
Coming Soon To (or is it from) a Frustrated User Near You! An article about how we 21st Century Americans have been taught to tolerate technologies that do not work. And how that tolerance alone substantially increases risk. And about how we do NOT have to use technology if we can’t find the time to make it “sing.”