Go to...
Services
Vigilant Cyber Services
Methodologies and Regulations
Training
Physical Assessments
Cyber Forensics
Virtual Assessments
Whitepapers
Disaster Recovery
Disaster Recovery Services
Off-Site Storage & Servers
Business Continuity
Infrastructure Assessment
Cloud Engineering
Virtualization
Cloud Solutions
EMR Hosting
Remote Desktops
Exchange Hosting
Application Dedicated Servers
Cloud Computing
CoLocation
ESX Hosting
Government Sector
Portfolio
Resources
News
Tools
Blogs
Contact
Site
Web
Search
Services
Vigilant Cyber Services
Methodologies and Regulations
Training
Physical Assessments
Cyber Forensics
Virtual Assessments
Whitepapers
Disaster Recovery
Disaster Recovery Services
Off-Site Storage & Servers
Business Continuity
Infrastructure Assessment
Cloud Engineering
Virtualization
Cloud Solutions
EMR Hosting
Remote Desktops
Exchange Hosting
Application Dedicated Servers
Cloud Computing
CoLocation
ESX Hosting
Government Sector
Portfolio
Resources
News
Tools
Blogs
Contact
Site
Web
Search
November 2021 (1)
October 2021 (1)
September 2021 (1)
August 2021 (1)
July 2021 (1)
April 2021 (2)
March 2021 (1)
January 2021 (1)
August 2020 (1)
July 2020 (2)
June 2020 (1)
May 2020 (1)
March 2020 (2)
February 2020 (1)
January 2020 (1)
December 2019 (2)
November 2019 (5)
October 2019 (1)
September 2019 (2)
August 2019 (1)
June 2019 (1)
May 2019 (1)
April 2019 (1)
March 2019 (1)
February 2019 (1)
November 2018 (1)
September 2018 (4)
August 2018 (2)
July 2018 (9)
June 2018 (4)
May 2018 (2)
February 2018 (2)
December 2017 (2)
November 2017 (2)
October 2017 (1)
July 2017 (2)
June 2017 (1)
January 2017 (3)
December 2016 (1)
November 2016 (2)
July 2016 (1)
April 2015 (1)
November 2014 (4)
October 2014 (2)
August 2014 (1)
June 2014 (1)
March 2014 (1)
January 2014 (1)
December 2013 (1)
November 2013 (1)
July 2013 (3)
June 2013 (7)
April 2013 (1)
February 2013 (6)
January 2013 (6)
December 2012 (8)
November 2012 (10)
October 2012 (2)
September 2012 (11)
July 2012 (2)
June 2012 (1)
May 2012 (1)
February 2012 (2)
November 2011 (1)
August 2011 (1)
December 2010 (1)
November 2010 (1)
May 2010 (4)
July 2009 (2)
June 2009 (1)
March 2009 (2)
November 2008 (1)
October 2008 (1)
September 2008 (5)
July 2008 (2)
June 2008 (2)
May 2008 (1)
December 2007 (1)
November 2007 (3)
September 2007 (2)
August 2007 (6)
March 2007 (1)
June 2005 (1)
May 2005 (1)
Events
Current Articles
|
Archives
|
Search
Entries for 'Sydney Gonzalez'
07
Apple App Secretly Sends Browser History to China
Sydney Gonzalez
posted on September 07, 2018 14:15
Adware Doctor was one of the most popular paid apps in the App Store. New research shows however, that the app is essentially spyware and is periodica...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (2)
06
Department of Homeland Security Cybersecurity Summit
Sydney Gonzalez
posted on August 06, 2018 12:19
The Department of Homeland Security (DHS) hosted the National Cybersecurity Summit in order to coordinate against threats to US infrastructure July 31...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
01
Phishing: What is it and how to Stop it
Sydney Gonzalez
posted on August 01, 2018 12:16
For those who don’t know what the term “phishing” refers to, it is the fraudulent practice of sending emails purporting to be from r...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
27
Bluetooth Flaw
Sydney Gonzalez
posted on July 27, 2018 09:18
A cryptographic bug in many Bluetooth firmware and operating system drivers could allow an attacker within only 30 meters to capture and decrypt data ...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
29
Exactis Data Leak
Sydney Gonzalez
posted on June 29, 2018 10:55
Exactis, a major data company based in Palm Coast, Florida, has reportedly exposed highly personal information, such as people's phone numbers, home a...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (315)
28
Security and WPA3 Routers
Sydney Gonzalez
posted on June 28, 2018 09:57
WAP3 will boost security in workplace Wi-Fi networks by changing the way wireless behaves on enterprise networks. The Wi-Fi Alliance, a partnership of...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
19
The City of Phoenix & Vigilant Technologies
Sydney Gonzalez
posted on June 19, 2018 12:58
Vigilant Technologies has been added to the City of Phoenix’s 2018-2020 Qualified Vendor List for Information Technology Professional Services a...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (6)
06
SOHO Routers and the VPNFilter Infection
Sydney Gonzalez
posted on June 06, 2018 11:06
Cisco’s Talos researchers discovered that foreign cyber actors have compromised hundreds of thousands of home and office routers and other netwo...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (0)
23
Cyrptojacking: What is it and How to Defend Against It
Sydney Gonzalez
posted on May 23, 2018 14:11
The internet is a fascinating global computer network that billions of people across the world utilize for a multitude of tasks. While the internet is...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
Services
Cloud Solutions
Vigilant Cyber Services
Disaster Recovery
Business Continuity
Cloud Engineering
Virtualization
Whitepapers
Resources
Portfolio
Blogs
News
Tools
Copyright 2004 - 2021 by Vigilant Technologies / Chandler Automated Systems / CASIT
:
Terms Of Use
:
Privacy Statement
Login