Jaspen IT Services
  • Home
  • Our Services
    • Computer Repair
    • Digital Signage
    • Managed Antivirus/Malware
    • Remot Support
    • Security Cameras
    • VOIP Phone Solutions
    • Web Design
    • WiFi Services
  • News
  • Online Payment
  • Login
  • Support
  • Contact
  • tel: 760-872.2797
Select Page

Shifting Threats in a Changed World: Edge, IoT and Vaccine Fraud

May 12, 2021 | Cloud Security, InfoSec Insider, IoT, Malware, News, Web Security

Shifting Threats in a Changed World: Edge, IoT and Vaccine Fraud Aamir Lakhani, researcher at FortiGuard Labs, discusses leading-edge threats related to edge access/browsers/IoT, and the COVID-19 vaccine, as a way of getting into larger organizations. Go to Source...

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange

May 2, 2021 | Government, Hacks, InfoSec Insider, Malware, News

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange Oliver Tavakoli, CTO of Vectra AI, discusses the differences between the massive supply-chain hack and the Exchange zero-day attacks, and their legacy and ramifications for security professionals. Go to Source...

4 Innovative Ways Cyberattackers Hunt for Security Bugs

Apr 22, 2021 | Hacks, InfoSec Insider, News, Vulnerabilities, Web Security

David “moose” Wolpoff, co-founder and CTO at Randori, talks lesser-known hacking paths, including unresolved “fixme” flags in developer support groups.

Crossing the Line: When Cyberattacks Become Acts of War

Apr 7, 2021 | Government, Hacks, InfoSec Insider, Malware, News, Web Security

The Cold War concept isn’t outdated. In the decades since the fall of the Soviet Union, the battleground has simply shifted from conflicts between ideological proxy governments to cyberspace. And the opponents have grown from a few primary nations into a broad range...

How To Defend the Extended Network Against Web Risks

Apr 5, 2021 | Hacks, InfoSec Insider, News, Vulnerabilities, Web Security

Aamir Lakhani, cybersecurity researcher for Fortinet’s FortiGuard Labs, discusses criminals flocking to web server and browser attacks, and what to do about it.

From PowerShell to Payload: An Analysis of Weaponized Malware

Apr 2, 2021 | InfoSec Insider, Malware, News

John Hammond, security researcher with Huntress, takes a deep-dive into a malware’s technical and coding aspects.
« Older Entries

Recent Posts

  • Why Apple’s overall Privacy focus in iOS 16.3 and macOS 13.2 is a big deal
  • Galaxy Book 3 leak spills the beans on the latest Samsung laptops
  • Yandex denies it was hacked, says rogue employee to blame for breach
  • How your office printer can offer a secret sustainability improvement
  • Lexmark security bug leaves thousands of its printers open to attack

Recent Comments

    The Jaspen Corporation © 1999 - 2022
    Web Design | Hosting |IT Solutions | Film Production Services | Webmail Access | Privacy Policy | Accessiblity Statement