Contact us today.Phone: +1 888 282 0696Email: sales@aurorait.com

The Maturation of Mobile Medical Apps

Technology doesn’t seem to be worth as much these days unless you can take it with you. Laptops, smartphones and tablets have fueled the evolution of a mobile workforce, and who doesn’t appreciate the convenience of accessing the information you need from home, office, airplane or even while stuck in highway traffic (just be careful […]

Beware of Supermarket Sniffers

California shoppers at the Lucky supermarket chain felt anything but lucky after discovering that their credit card information may have been hacked. Until now, the only frustrations found in checkout lines came from people who steer overflowing shopping carts into the express lane. But the convenience afforded by paying for purchases with a quick swipe […]

The Need for Speed

Hard to believe, but the film Top Gun is now 25 years old. Among other things, this is the movie that gave us the famous line, “I feel the need – the need for speed.” After reading a report by Pando Networks on Internet access and speed, many Americans may share that same sentiment. If […]

Just Another Day

Companies and municipal organizations that braced themselves on September 24, concerned about cyber-attacks launched by the hacker group Anonymous, are breathing easier now. As it turned out, their threatened “Day of Vengeance” was just another day. Anonymous had allied itself with political groups that participated in September demonstrations against Wall Street and the banking industry. […]

Twitter Hits a Milestone

How many people thought Twitter was a dumb idea when they first heard of it? Who could have guessed that this 140-character social network would eventually host a presidential town hall, play a role in the overthrow of dictators in the Middle East, and revive Ashton Kutcher’s career? Twitter launched on July 15, 2006. It […]

Paging Dr. Chrono

Data breaches in the healthcare field are a significant concern that Aurora has tried to not only highlight, but to provide solutions to prevent. We also hear from customers about growing trepidation over the security of mobile devices, and not just cell phones but tablets such as the iPad. A startup company called DrChrono has […]

Filling the Holes

Computerworld magazine published an insightful piece on six enterprise security leaks that should be addressed. Read the piece here: (https://www.computerworld.com/s/article/9189738/Six_enterprise_security_leaks_you_should_plug_now?taxonomyId=17pageNumber=1) The list begins with unauthorized smartphones on Wi-Fi networks. While many companies have introduced policies prohibiting employees from using personal devices at the office, it is commonplace for workers to sneak in a phone call […]

A Face in the Crowd

While many of us can’t even remember what the business world was like in the pre-Internet era, the transfer of so much of our personal and professional information into a virtual online world is really still in its infancy compared to the other forms of communication that have existed for centuries. Why is this important? […]

Phishing Smarter

“Phishing” attacks aren’t new. You know the kind…”Craigslist needs you to confirm an account because it’s temporarily suspended” or “Some some person in Nigeria needs you to wire some money and your generosity will be rewarded handsomely!” For the most part they have been easy to spot even if they successfully get through the anti-spam-phishing-virus-bot-dos-reputation-system-algorithm […]

HackedIn

I’m sure this is not the news the shareholders were hoping for days after LinkedIn went public. This vulnerability can affect up to 100 registered users. The vulnerability lies in the way the cookies are handled. If you are interested in knowing exactly how this can be done you can find more information here. He […]