Hackers take advantage of unsupported software

If your version of any software system is no longer supported, you are putting your…

Nmap Decoy Scans – The Hamburger

TLP: Public Nmap Decoy Scans – The Hamburger Hackers are using the nmap -D option…

Common incoming TCP/UDP hacker scans against your firewall

TLP:Public Common TCP and UDP port scans that people see against their firewalls. Since March…

The Hidden China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking

Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement Surprisingly, the voluntary 2015…

Is Blockchain Technology Seriously Overvalued?

Is Blockchain Technology Seriously Overvalued? What amazes me these days is how people can take…

Social Media Disinformation Bots, Sockpuppets and Trolls the new additions to Cyber Security

The problem for Cyber Security with social media these days is the huge amount of…

Microprocessor Speed vs Security Flaw

Microprocessor Speed vs Security Flaw Spectre and Meltdown are both flaws in every modern microprocessors,…

Meltdown and Spectre Vulnerabilities

Meltdown and Spectre Vulnerabilities New York, NY – We at Adept Technologies have already updated…