Keeping compliant with the myriad of regulations that currently abound is one of the major challenges facing the enterprise and its leaders today.

Tevora Blog

  • Archives

Tevora has offices at the following locations:

Southern California: (Headquarters)

One Spectrum Pointe Drive, Suite 200
Lake Forest, California 92630.
Tel: 949.250.3290
Fax: 949.250.9993
Driving directions

Protecting Against ‘Zero Day’ Exploits

Monday, 18 August 2014 by

As cyber-criminals grow more sophisticated in skill and resource, the potential impact of exploits on personal, government and business systems has grown.

(continue reading…)

Splunk Setup Guide

Thursday, 10 April 2014 by

Splunk is a powerful tool for collecting and processing log files from a variety of systems and devices.  The true power of Splunk comes from the search and reporting capabilities available.  This guide is centered around providing a simple Splunk server that can receive logs from a Windows system.  This instance can be used to […]

(continue reading…)

Penetration Tests Are Not Vulnerability Assessments

Monday, 30 September 2013 by
penetration-testing- 9302013

I often, as well as many of my peers and colleagues, have to explain to a client the difference between a vulnerability assessment and a penetration test.  There are a lot of security consulting firms out there that show up to a client’s worksite, run a vulnerability scanner, validate some findings, copy and paste the scanner’s […]

(continue reading…)

SIM Card Hack Causes Major Headaches for Business

Friday, 26 July 2013 by
ML 7-26-2013

More than 20 years after its initial inception, the SIM card has been hacked. A German cryptographer named Karsten Nohl will be presenting findings to that effect at the annual Black Hat computer security conference at the end of the month.

(continue reading…)

HP Builds Backdoors into Storage Products… Always a Bad Thing?

Tuesday, 16 July 2013 by
ML 7-16-2013

In what should come as a surprise to just about nobody, Hewlett-Packardrevealed on July 9th that their StoreVirtual Storage products contain hidden administrator accounts with root access that can be used by HP support to access the operating system. The account exists “to help customers resolve complex support issues”. Thankfully, HP claims, the account isn’t able to […]

(continue reading…)

Tag Team Virus Duo Discovered

Tuesday, 2 July 2013 by
ML 7-2-2013

Security researchers from Microsoft have discovered an interesting and unique virus combo – two unique malware programs that work together in an effort to bypass antivirus software by automatically downloading the other virus should it be removed from the host computer.

(continue reading…)

Extra-Life: Help Save Sick Kids

Monday, 17 June 2013 by
ML 6-17-2013

MassiveLabs has teamed up with Extra-Life and a lot of our clients to help raise money for sick kids in the Children’s Miracle Network.  The tax-deductible donations will be given to the Children’s Miracle Network Hospital of your choice.

(continue reading…)

What was Snowden thinking?

Saturday, 15 June 2013 by
ML 6-15-2013

Everywhere you look for the past couple weeks there is something on the news about Edward Snowden, the NSA whistleblower.  I figured it was time for us to acknowledge his story.  Long story short, Snowden disclosed to the international media that the NSA has the capability to monitor private phone calls and internet messaging for […]

(continue reading…)

From Slacker to Hacker

Friday, 14 June 2013 by
ML 6-14-2013

Three Purdue engineering students are facing a series of felony charges after prosecutors say they altered their own grades in an elaborate scheme.

(continue reading…)

Android Malware To The Next Level

Thursday, 6 June 2013 by
ML 6-7-2013

The most sophisticated piece of Android malware has been discovered by security researchers at Kaspersky Labs. The Trojan does things no other Android malware has done before. During their analysis they found that it exploits multiple vulnerabilities, blocks uninstall attempts, attempts to gain root access, and can execute a host of remote commands.

(continue reading…)