Businesses today face many threats to their networks and the critical files and data contained within. Malicious software such as viruses, malware, ransomware, and trojans are out there prowling around for susceptible systems to wreak havoc upon. Let RHYNONetworks help you protect your company’s assets!   Viruses Viruses can render your business computers inoperable, or […]

This question has been iterated more times than I can recall over the years from computer users.  The candid answer is simple.  By using your computer you, the computer operator, allowed the virus in.  Beyond the firewalls and antivirus software the best and last line of defense against a virus is you, the computer operator. […]

FOX-IT and FireEye have partnered together and have been able to recover the private keys used in the CryptoLocker encryption which locks users out of their own files. They have also been able to reverse engineer the devastating ransomware. As a result of their efforts infected users can go to their website, upload an encrypted […]

As you may already know, USB drives can infect computers with malware or other malicious software. Many liken the situation to reusing a contaminated needle. At present there aren’t many tools that address this potential entry point for hackers, so it is wise to be cautious with USB drives and what is stored on them as […]

NBC News Tech Security has just posted a helpful article educating users about four dangerous types of cyberattacks that many are falling victim to currently. The article not only describes the cyberattacks but also educates users on how to protect themselves and what to do should they fall prey to such attacks. The article discusses: Ransomware […]

Fox News reports that security researchers are using the heartbleed bug to target hackers. Private hacker forums can be compromised and conversations where hackers exchange data and information can be snagged and used by anti-malware researchers. Read the entire story here.

Information Systems and Supplies (ISS) POS systems have recently been compromised, using a remote access account. The companies affected are restaurants and bars in the Vancouver, WA region who utilize the ISS POS systems. This compromise is similar to the high profile hacking instances such as the Target breech, in that it began with hackers gaining […]

The Emotet malware can use the victim’s browser’s network APIs to sniff out financial information going out from the victim’s computer. It is spread through phony bank transfer notice emails or phony bank invoice emails. So far the malware has targeted mainly banks in Germany, but other countries have been hit so it isn’t restricted to any […]

Hundreds of thousands of users are being affected. Malware-armed scammers are using DropBox to infect users. They are using emails with links to DropBox hosted files to infect users with the CryptoWall ransomware. Remember that even legitimate looking emails can be a scam. In linking to DropBox, many users are falsely assuming the emails are […]

Google security engineer Tavis Ormandy has recently uncovered a vulnerability in Microsoft’s malware protection engine. This hole allows attackers to create a file that the products would scan and due to this scan, become disabled. Details on the contents of these malicious files hasn’t been disclosed but Ormandy hinted that the vulnerability involves the JavaScript Interpreter. An […]