Don’t take your eye off the ball…

The CIA elite hackers were so preoccupied with building cyber weapons they neglected to secure their own systems… With “Vault 7”, the CIA could hack into any device with a suite of tools designed to read and copy data from electronic devices. Unfortunately their “woefully lax” security procedures  allowed those weapons to be stolen by hackers. The leaked […]

READ MORE

Windows 10 May 2020 Update delayed after zero-day discovery

The corruption-reporting bug is among a set of vulnerabilities being ironed out by developers. Microsoft has delayed the release of the next major Windows 10 upgrade by two weeks after flagging a number of issues including a zero-day corruption-reporting vulnerability. The May 2020 Update must wait until the end of the month as Windows 10 developers plan […]

READ MORE

Is your Business PCI Compliant?

The PCI Data Security Standard specifies twelve requirements for compliance, organized into six logically related groups called “control objectives”. Each version of PCI DSS has divided these twelve requirements into a number of sub-requirements differently, but the twelve high-level requirements have not changed since the inception of the standard. Control objectives PCI DSS requirements Build […]

READ MORE