What is rowhammer? It’s not new, rowhammer was discussed in the “Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors” paper published in 2014. But until now exploiting it required software to be installed on the victim computer. Google’s Project Zero has just proven that rowhammer exploits can be executed […]

  Earlier today everything blew up. Multiple major companies suffered from crippling ‘technical glitches’ this morning. The affected companies include: New York Stock Exchange The Wall Street Journal United Airlines United Airlines suffered from problems with its reservation system and made an apology to travelers. The NYSE was forced to halt trading until 3:15pm. According […]

Businesses today face many threats to their networks and the critical files and data contained within. Malicious software such as viruses, malware, ransomware, and trojans are out there prowling around for susceptible systems to wreak havoc upon. Let RHYNONetworks help you protect your company’s assets!   Viruses Viruses can render your business computers inoperable, or […]

Hacks against websites or networks are very serious, but let’s take a moment to look at some of the dumbest hacks, craziest or most famous hacks that have been perpetrated against people, companies and networks. Famous Hacks This list is of course far from exhaustive. But here are some highlights in the history of hacking: Arpanet Hack […]

The Chinese government has recently hacked into one of the Office of Personnel Management computers and accessed roughly four million accounts. I is the largest breach in recent years and the agency has notified the affected workers. China has hacked US government computers twice in the past year. With this latest breach the hackers gained access to […]

2015 is here! Have you begun the year’s IT planning? Expiring licenses will need to be renewed. Old systems and technologies will need to be upgraded. Known vulnerabilities will need to be patched up. Unforseen threats will need to be anticipated.   Don’t lose sleep trying to handle it yourself, call the experts at RHYNO […]

Protecting your privacy in today’s connected world can be a full time job – at least. You may not be able to go completely dark to the data brokers and others who are out there in the jungle that is the internet, but you can take steps to protect yourself. CBS aired a great segment […]

This question has been iterated more times than I can recall over the years from computer users.  The candid answer is simple.  By using your computer you, the computer operator, allowed the virus in.  Beyond the firewalls and antivirus software the best and last line of defense against a virus is you, the computer operator. […]

TechCrunch has just reported that Yahoo has paid bug hunters $700,000 in rewards during the Bug Bounty Program’s first year. The program is a reaction to the security community’s complaints that the company was taking advantage of researchers by paying them a mere $12.50 in company vouchers for finding weaknesses in Yahoo’s products. In an attempt […]

The theft of high profile celebrity selfies coupled with a feeling that Apple has become stagnant in the area of innovation has investers nervous just before the release of the iPhone 6. Apple has been taking steps to beef up the security of its iCloud service but confidence is still wobbly.   You can read […]