Latest Security Vulnerabilities – JUN 2019

Microsoft Speech API – Remote Code Execution Vulnerability   Description: A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. Threat: To exploit the vulnerability, an attacker would need to...

Latest Security Vulnerabilities – MAY 2019

Internet Explorer – Information Disclosure Vulnerability   Description: An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. Threat: An attacker who successfully exploited the vulnerability could obtain...

Latest Security Vulnerabilities – APR 2019

Microsoft Edge – Chakra Scripting Engine Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. Threat: If the current user is logged on with...
Protecting Your Identity

Protecting Your Identity

Back in the day, criminals stole your information by accessing your wallet, phone tapping, or even sifting through your rubbish.  Their intent was to impersonate you and make purchases on your behalf. Today, the shift has taken us online.  Everyone likes to find a...