Blog

WordPress Plugin Leaves Sites Vulnerable

Researchers at Defiant authored the popular Wordfence security solution for WordPress users and they have detected a massive campaign that has seen hackers actively scanning for websites employing the Kaswara […]

Technology Advances With Speech-Recognition Via AI Technology

If you haven't heard of the UK startup Speechmatics, it may come as a surprise to learn that the company may be on its way to becoming a globally recognized […]

Windows 11 Apps Are Being Tested For Kiosk Mode

There's interesting news in the world of Windows 11 development.  Microsoft recently began testing a new Kiosk feature that will enable IT administrators to limit which applications users can use […]

Skimmers Are Stealing Credit Card Information From US Restaurants

If you eat out or are in the habit of ordering take-out on a regular basis, be aware. Recently, a large, well-organized web-skimming campaign has been uncovered that allowed hackers […]

Nvidia Leads Quantum Computing Innovation With New Platform

Quantum computing is on the horizon.  Unfortunately, it's been on the horizon for at least two decades.  It's one of those technologies that's always "just around the corner." In recent […]

Large Scale Okta Phishing Campaign Targets Many Organizations

According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no less than 130 organizations across a broad range of […]

Healthcare Data Breach Exposes 1.3 Million Patients

Do you make use of the "MyChart" portal to refill prescriptions, contact your healthcare providers or make appointments? If so, you should know that recently, the healthcare giant Novant disclosed […]

LastPass Has Been Hacked

Using different passwords on every website and storing them in a secure password manager is a standard best practice in data security. It's generally good advice, but what happens when […]

New Tools Available With Kali Linux 2022.3

Do you have the Kali Linux distribution running on one of the machines you own?  If you're not sure what that is, then you almost certainly don't.  Kali is a […]

Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability

MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There's a […]

Contact

Sterling Networks
2277 Townsgate Rd, Ste 208
Westlake Village, CA 91361

Phone: (805) 579-8998
Email: info@sterlingnetworks.net

Social Media

Facebook Google Plus Twitter LinkedIn YouTube RSS