In today’s data driven world, running a small business is no easy task. Technology is advancing at astonishing rates and it’s difficult for business owners to keep up. Working with an IT consulting company can be an extremely simple solution to tackling the ever changing landscape of digital security and risk management. What Can IT […]
As in any field, the field of information technology has its own specific slang. We all know that “byte” in the computer world, though a homophone for “bite”, has nothing to do with eating, and rather refers to a piece of digital information. But what about “footprint”? We hear a lot about reducing our carbon […]
What is rowhammer? It’s not new, rowhammer was discussed in the “Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors” paper published in 2014. But until now exploiting it required software to be installed on the victim computer. Google’s Project Zero has just proven that rowhammer exploits can be executed […]
Businesses today face many threats to their networks and the critical files and data contained within. Malicious software such as viruses, malware, ransomware, and trojans are out there prowling around for susceptible systems to wreak havoc upon. Let RHYNONetworks help you protect your company’s assets! Viruses Viruses can render your business computers inoperable, or […]
2015 is here! Have you begun the year’s IT planning? Expiring licenses will need to be renewed. Old systems and technologies will need to be upgraded. Known vulnerabilities will need to be patched up. Unforseen threats will need to be anticipated. Don’t lose sleep trying to handle it yourself, call the experts at RHYNO […]
Another serious vulnerability has been found in OpenSSL’s crypto library. This coming just on the heels of the Heartbleed nightmare. If you are running as a client you are vulnerable no matter the older version of OpenSSL, but servers are only vulnerable when running 1.0.1 and 1.0.2-beta1 – and in order for an attack to […]
Two weeks is how long Windows users have to beef up their computers and protect themselves from Gameover Zeus. Why two weeks? The FBI and international police have uncovered and disrupted the orchestrated Gameover Zeus attacks, but warn that two weeks would be sufficient time for the hackers behind this extremely sophisticated piece of malware to reorganize […]
Reuters has just reported that some security experts may be launching an effort to revive the mysteriously shut down TrueCrypt tool. It is still a mystery why the project’s developers shut it down, one possibility cited by Reuters is a possible government forced back door access. You can read the entire Reuters article here.
In light of the nightmare that is the HeartBleed bug, big players in the tech industry are now throwing money at OpenSSL. Thanks to this monetary injection OpenSSL will be able to employ two full time developers as well as funding for auditing. You can read IT News’ write up on this here.
RHYNO Networks offers proven solutions to help build, support and monitor your network and IT infrastructure. In addition, we help you consolidate your software applications more efficiently onto fewer servers, reducing energy usage, hardware maintenance and IT costs. And we’ll more effectively allow employees to access applications and data remotely – and securely. Reduce IT […]