Tustin, Irvine, Santa Ana | Reliable IT

Blog

Facebook Adding Physical Security Key Support For Mobile Devices

Many industry insiders consider physical security keys used in the context of two-factor authentication login schemes to be the final word in digital security. That is because even if your password is compromised, if you're using a physical piece of hardware that has to be inserted when prompted for to complete the process, a hacker ...

Read More

Be Careful Downloading Clubhouse App On Android

Clubhouse has taken the internet by storm. Or rather, it has taken the iOS ecosystem by storm, since the company has yet to release an Android version of their increasingly popular app. If you're not sure what all the fuss is about, Clubhouse is an audio chat app that is invitation only. If you get an ...

Read More

Another Malware Evolves To Gain Access To More Systems

One of the more disturbing trends this year is that worms are becoming popular among the hackers of the world again. We've seen a handful of new malware strains introduced in recent months with worm modules added to their code, allowing them to scan and infect Windows systems connected to the initial source of the infection. That's ...

Read More

Memory Savings Improvements Makes Windows 10 Google Chrome Faster

If you're a Google Chrome user, and you're interested in maximizing the overall performance of your system, then Google's recent announcement about their browser is sure to make you smile. The release of Chrome 89 includes enhancements design to make it run notably faster on Windows 10 and use significantly fewer resources on both Android and ...

Read More

Internet Browsers Blocking Some Ports Due To Security Vulnerabilities

If you rely on TCP port 554, you'll probably want to do a bit of reconfiguration. Last year, security researchers discovered a new version of the NAT Slipstream vulnerability that allowed hackers to deploy malicious scripts in order to bypass a website visitor's NAT firewall and access any TCP/UDP port on the visitor's internal network. If this ...

Read More

Now Hackers Are Attacking Exchange Server Vulnerabilities

In early January of this year (2021), Microsoft informed security expert Brian Krebs that the company found four zero-day security flaws in their Exchange Server. Those flaws were actively being exploited by a persistent threat group known as Halfnium, sponsored by the Chinese government. According to Microsoft's statistics, more than 30,000 Exchange Servers had already been ...

Read More

New Windows Server 2022 Includes Security Improvements

Recently, Microsoft made an announcement regarding the particulars of Windows Server 2022, and there's a lot to like in terms of built-in protections. That is amazing, even if you're not especially concerned about security. Here's a quick overview of what you can expect: First and foremost, Server 2022 will incorporate "Secured-Core" technology already in use on ...

Read More

New Ryuk Ransomware Function Spreads Across Networks Quickly

In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According to a recent report published by France's national cybersecurity agency, it just got even more dangerous. Ryuk has historically been used preferentially against hospitals and companies closely ...

Read More

New Ransomware Strains Have Researchers On Their Toes

Recently, researchers have discovered two new ransomware strains, dubbed "AlumniLocker" and "Humble", both of which have very different ways of doing what they do. This highlights the ongoing development and diversification of the larger ransomware threat and underscores the fact that it will be a major cause for concern in the years ahead. Both new strains were ...

Read More

People Using Mobile Data Instead Of Internet Service Providers

The ongoing pandemic has impacted daily life in the United States in a number of ways, some predictable and others surprising. On the predictable side, when tens of thousands of employees were asked to work from home, broadband internet connectivity saw a huge surge in use and nearly 80 percent of broadband users upgraded their service ...

Read More