Tustin, Irvine, Santa Ana | Reliable IT

Blog

New Windows Server 2022 Includes Security Improvements

Recently, Microsoft made an announcement regarding the particulars of Windows Server 2022, and there's a lot to like in terms of built-in protections. That is amazing, even if you're not especially concerned about security. Here's a quick overview of what you can expect: First and foremost, Server 2022 will incorporate "Secured-Core" technology already in use on ...

Read More

New Ryuk Ransomware Function Spreads Across Networks Quickly

In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According to a recent report published by France's national cybersecurity agency, it just got even more dangerous. Ryuk has historically been used preferentially against hospitals and companies closely ...

Read More

New Ransomware Strains Have Researchers On Their Toes

Recently, researchers have discovered two new ransomware strains, dubbed "AlumniLocker" and "Humble", both of which have very different ways of doing what they do. This highlights the ongoing development and diversification of the larger ransomware threat and underscores the fact that it will be a major cause for concern in the years ahead. Both new strains were ...

Read More

People Using Mobile Data Instead Of Internet Service Providers

The ongoing pandemic has impacted daily life in the United States in a number of ways, some predictable and others surprising. On the predictable side, when tens of thousands of employees were asked to work from home, broadband internet connectivity saw a huge surge in use and nearly 80 percent of broadband users upgraded their service ...

Read More

Mobile App Vulnerabilities Found To Leave Data Unsecured

Most apps these days make use of cloud storage in order to minimize their footprint on your device. That's good in theory, but based on new research from Zimperium, a disappointing percentage of app developers don't do nearly enough to secure the data they're housing for you. In fact, the recent study indicated that fully ...

Read More

Microsoft Is Giving Windows 10 A New Makeover

One of the most frequently heard complaints about Windows has to do with aesthetics. Despite a few seemingly halfhearted attempts to modernize, significant portions of the OS looks and feels like they were designed in the 90's. That's because Windows is still utilizing a lot of design techniques and icons from Windows 95, so the criticism ...

Read More

Hackers Are Using Unpatched NAS Devices To Mine Bitcoin

In late 2020, QNAP discovered a pair of critical security vulnerabilities that would allow hackers to take remote control over network attached storage devices (NAS). In this particular instance, the hackers chose not to encrypt files and demand payment or cause other mayhem. Instead, they made slaves of the devices and put them to work ...

Read More

Microsoft Expanding Fight Against Macros Based Malware

Macros have been a simple, effective means of spreading malware since the 1990's, and some hackers still rely on them heavily to ensnare and infect unsuspecting users. It's a long standing issue that many companies have attempted to address over the years. Now, it seems that it's Microsoft's turn at bat again. Recently, the Redmond Giant announced ...

Read More

Latest Apple Update Fixes Web Security Flaw On Most Devices

Recently, two different security researchers (Clement Lecigne of Google's Threat Analysis Group, and Alison Huffman from Microsoft's Browser Vulnerability Research Group) discovered a pair of serious security vulnerability impacting Apple devices. The bugs, tracked as CVE-2021-1844 and CVE-2021-21166 respectively, are browser-based memory issues that could have allowed remote code execution if the victim navigated or was ...

Read More

Hacker Uses Zoom Invites To Steal Credentials Through Sendgrid

There's a mix of bad news and good in the ongoing war against the hackers of the world. For the bad news, security professionals have recently detected a sophisticated phishing campaign that makes use of SendGrid and convincing replicas of Outlook on the Web and Office 365 logins to harvest credentials. The attack works like this: SendGrid ...

Read More