Logix SupportDesk Android App- Providing 24 x 7 support to all our customers

support desk3

We believe in serving our customers without any delay. In order to provide complete and unhindered support to our 2200+ customers, we are glad to launch our SupportDesk mobile ticketing app on Google Play for an unmatched 24 x 7 Support at your fingertips! Logix SupportDesk Highlights: First-of-its-kind by any IT service provider. For ease […]

Continue reading


Web applications: new back-doors to access private data

web browser main

Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries post the access is granted. This is alarming mainly because a normal person browsing the internet is caught unaware of something like this even exists. Various browsers – Chrome, Firefox, Opera extension have been tested […]

Continue reading


Penetration Test vs Vulnerability Assessment. Choose wisely, stay protected.

penetration testing vulnerability assessment

It is definitely surprising that most people take penetration testing for vulnerability testing and vice-versa, sometimes even forego one for the other. Penetration testing exploits vulnerabilities in your system architecture, while vulnerability assessment checks for known vulnerabilities and generates a report on risk exposure. Both penetration testing and vulnerability assessment depend mostly on three factors: […]

Continue reading


2 million network storage devices affected by unpatched zero-day vulnerabilities!

2 million network storage devices

Network storage devices (NAS), are critical for small and medium businesses as it adds to the extra storage space when these business are running out of space. Critical shortcomings have been discovered in the NAS devices such as WD my book, SeaGate home, Medion Lifecloud, Netgear Stora. This critical vulnerability allows actors to exploit the […]

Continue reading


Are your website images secured?

googleusercontent

Malware can enter your machine through corrupted images on any website. Malware is stored in Exchangeable Image File Format (EXIF) data. Recently instances have occurred where in hackers are hiding malware in the images and uploading such images to the Google’s official CDN (Content Delivery Network) – googleusercontent.com. How malware is embedded in an image? […]

Continue reading


How to avoid Equifax breach with regular Vulnerability Assessments ?

equifax

Ever higher than before, the frequency and scale of cyber breaches continue to startle everyone. In this case, cyber thieves, via Equifax breach, made off with highly sensitive personal information including social security and credit card numbers of about 143 million users. However, one interesting information has surfaced that Equifax knew about the breach much […]

Continue reading