Featured Blog

/

On February 28, 2014

Hackers have encroached all areas. Way beyond mobile and wireless…

Hackers are "Hacking all the things". We are starting to hear about environments like thermostats, heating, ventilation, air-conditioning using web interfaces and http custom protocols.  Those are big security issues. Next, over the last several months there have been numerous cases of hackers ta ...

Read More
/

On February 12, 2014

Customers are our voice. Hear their data security and PCI compliance stories.

Read What Omega Clients Are Saying And View Video Testimonials " They were a blessing, a God-sent and I go to work everyday feeling much better. ...

Read More
/

On February 3, 2014

Security attack trends in 2014

According to the 'global threat report', Spear phishing (email spoofing) is going to stay popular this year.  The next type would be what is described as 'watering hole' attacks that target website with malware so they can attack visitors of the site.   It is reported that several companies succum ...

Read More
/

On January 14, 2014

Alarming statistics on attacks by US and foreign hackers

Thought I should share these interesting statistics I came across in one of the security magazines. Top 5 attacks used by U.S. hackers

  1. Zero access trojan
  2. Butterfly botnet
  3. ZeuS trojan
  4. Allaple.A worm
  5. Pushdo trojan
< ...

Read More
/

On January 2, 2014

‘Man in the browser attack’ has latched on to Twitter

The last post explained what 'man in the browser attack means.  This is a follow-up detailing how the attack has targeted 'Twitter' accounts to make it easy to spread to enterprise networks. Here is how the malware has been working on 'Twitter' JavaScript code gets into a Twitter ...

Read More

Stay up to date with the latest from Omega