Tustin, Irvine, Santa Ana | Reliable IT

Blog

Paradise Ransomware Using Internet Query Files To Deliver Payload

The Paradise ransomware is like a bad penny; it just keeps turning up. The strain first appeared back in 2017, when it was spread far and wide via phishing emails. Then it seemed to fall out of favor for a while, and now, it's back again. Even worse, it's back with a new trick up its ...

Read More

Malware Is Targeting Cookies On Android Devices To Gain Access

There's a new malware threat to be aware of, called "CookieThief," which is an apt name that describes what the malware does. Honestly though, the Hackers missed the mark here. "CookieMonster" would have been a much better name option. In any case, it's part of a growing new collection of malware strains that is able to ...

Read More

Intel Graphics Get Update To Address Security Issues

If you have a personal computer that uses Intel technology, you're not going to want to miss the update released in March's Patch Tuesday. The latest update addresses a total of 27 vulnerabilities. Ten of them rated as high severity flaws that impact Intel's Graphics Drivers for Windows. Also impacted is the Smart Sound Technology integrated ...

Read More

Google Chrome Guest Mode Is Great For Shared Computers

Google has recently rolled out a small but important change to its Chrome browser for Windows, Linux and macOS users. The most recent update adds a 'Default to Guest mode' to the browser that can be enabled via Enterprise policy or a simple command-line switch. When the new feature is enabled, any time a browser session ...

Read More

Certain RAM Modules Continue To Have Security Vulnerabilities

Remember the Rowhammer vulnerability that made headlines around the world last year? 2019 saw all sorts of unusual threats, so if you're struggling to recall the details of that one in particular, here's a quick review: Any time a modern RAM card handles data, it is saved in memory cells that are arranged in a grid pattern ...

Read More

Recent Data Breach Affects Some Walgreens Mobile App Users

Are you a Walgreens customer? Do you make use of the company's mobile app, available for both Android and iOS devices? If so, be advised that the company recently disclosed a serious flaw in the app that inadvertently leaked both Personally Identifiable Information (PII) and Personal Health Information (PHI). The information was in the form of ...

Read More

The Web Browser Wars Have A Clear Winner In 2020

It's notoriously difficult to get reliable statistics on web browser usage. While there are sites that purport to track such things such as StatCounter and NetMarketShare, the numbers coming from these sources have proved to be problematic and unreliable. Enter the US Government's Digital Analytics Program (DAP, for short). While it doesn't reveal anything about browser ...

Read More

T-Mobile Is The Latest To Get Hit By Data Breach

Are you a T-Mobile customer? If so, be advised, the company recently published a Notice of Data Breach on their website to inform all clients that an email vendor they utilize was hacked. The notice said that the hack exposed the financial and personal information of a small fraction of the company's customers. In addition to ...

Read More

Phone Call And Text Phishing Scams Are On The Rise

For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are increasingly on their guard against them. Naturally, this prompts scammers to change their tactics, switching things up a bit to catch people by surprise. In this case, ...

Read More

New Phishing Emails Trick Users With Convincing Security Credentials

Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year (2020). When targeted by this attack, a user will get an email containing a braded document containing the name of a legitimate cybersecurity provider. The ...

Read More