Vulnerability Assessment


Dumpster Diving Low Tech Hacking at its Finest

Social Engineering Awareness Part 1: Dumpster Diving Dumpster diving remains a prevalent security risk for almost every organization. Dumpster diving is a form of Social Engineering that takes very little technical knowledge. A potential hacker’s goal while dumpster diving is to look for any information hidden within the trash to […]


Yahoo’s New Big Breach 500 Million Accounts Hacked

Yahoo’s new breach 500 million accounts hacked Ever since the security breach in 2014, Yahoo has been having an ongoing investigation into the incident.  Last Thursday Yahoo has released a statement about yet another setback for the internet company. Yahoo admits they are not sure what information is stolen, however, […]


Cyber Security’s Weakest Link is Human Beings

  The Weak Link In Security Often times when a company looks into becoming more secure, they typically look to add devices, software or settings in place to help defend their network. It’s hard to convince them that the weak links in there network is the employees on them. Convincing […]


Why are DDOS attacks hard to defend against?

For a company one of the most terrifying things to deal with is having down time. Your network being down means you can’t make sales or continue normal operations. One attack hackers use in particular takes advantage of this fear. This attack is known as Distributed Denial of Service or […]


Exodus Intelligence Security Firm offers up to $500,000-dollar bounty for security exploits

One way companies are now attempting to discover vulnerabilities in their software or products, is to offer a bounty for any exploits that are found in their software by any third party’s. This is a good way for companies to motivate the public to actively search out exploits. These exploits […]


Free Flash Drives May Cost More Then You Think

  Last week was the annual Black Hat conference held in Las Vegas. Thousands of the best hackers from around the world, gathered to show the research they have uncovered on various topics. Among many of these reports of malicious viruses, vulnerabilities and hacks one research report got a little […]


Vunerability – Qualcomm Chipsets Leave Nearly 900 Million Devices At Risk of Being Hacked

Over the weekend, researchers from the Cyber Security firm Check Point released a report on a new vulnerability. This report exposed some very risky vulnerabilities within the Qualcomm chipsets used in an estimated 900 million Android smartphones and tablets. This is roughly equivalent to 65 percent of the global 4G/LTE chipset market […]