Uncategorized

Meltdown and Spectre, the new vulnerabilities in the processors

The National Center for Cybersecurity and Communications Integration (NCCIC) detected a set of security vulnerabilities, known as Meltdown and Spectre, that affect modern computer processors. Exploiting these vulnerabilities could allow an attacker to gain access to confidential information. Meltdown: this vulnerability is the easiest to exploit and the one that gets the most attention. It […]

Uncategorized

What will be the main trends in technology for this 2018?

  According to Gartner, the technological keys for 2018 will be marked by trends such as artificial intelligence, IoT, intelligent applications, digital twins, edge computing, immersive experience, cybersecurity or blockchain, among others. As every year, we analyze the technological trends that will continue to revolutionize our lives based on the annual report of the Gartner […]

Uncategorized

Intel’s firmware contains serious vulnerabilities that affect millions of systems

In response to problems identified by outside researchers, Intel conducted a comprehensive security review of the Intel® Management Engine (ME), Intel® Server Platform Platform Services (SPS) and Intel® Trusted Execution Engine (TXE) with the goal of improving endurance of the firmware. As a result, Intel has identified security vulnerabilities that could potentially put the impacted […]

Uncategorized

Our social networks

We invite you to follow us in our social networks. Twitter: @Openlink_ https://twitter.com/Openlink_ LinkedIn: Openlink_ https://www.linkedin.com/company/399540/admin/updates/ Facebook: @JoinOpenlink https://www.facebook.com/JoinOpenlink/

Uncategorized

Key Reinstallation Attacks (KRACKS)

Serious weaknesses were discovered in WPA2, a protocol that secures all Wi-Fi networks protected today. An attacker within range of a victim can exploit these weaknesses by using reinstallation attacks (KRACK). Specifically, attackers can use this new attack technique to read information that was previously supposed to be securely encrypted. This can be abused to […]

Uncategorized

OPENLINK: We take business to another dimension

Welcome to our new website where you will find the best of what we are and the best of what we do. We invite you to take a tour of all our sections, where you will find all our portfolio of solutions and services, know a little about who we are and where we are […]

  • 1
  • 2