Blog

Our Blog

VENOM vulnerability

Cloud Computing (as against cloud storage or cloud CRM or cloud spreadsheet app, etc) makes use of virtual computer technology.

Beyond VENOM

Within a few weeks of VENOM vulnerability being published, we have 3 more similar vulnerabilities - related to QEMU.

FREAK: Factoring Attack on RSA-EXPORT Keys

It has been known that as computing resources become cheaper, it becomes feasible to break the encryption that uses progressively longer keys.

Links to external resources/blogs

SO WHAT CAN WE DO FOR YOU ?

For all your software product security and IT security compliance requirements

Contact Us ☎