What is rowhammer? It’s not new, rowhammer was discussed in the “Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors” paper published in 2014. But until now exploiting it required software to be installed on the victim computer. Google’s Project Zero has just proven that rowhammer exploits can be executed […]

Hacks against websites or networks are very serious, but let’s take a moment to look at some of the dumbest hacks, craziest or most famous hacks that have been perpetrated against people, companies and networks. Famous Hacks This list is of course far from exhaustive. But here are some highlights in the history of hacking: Arpanet Hack […]

The Chinese government has recently hacked into one of the Office of Personnel Management computers and accessed roughly four million accounts. I is the largest breach in recent years and the agency has notified the affected workers. China has hacked US government computers twice in the past year. With this latest breach the hackers gained access to […]

Of late there as been a bit of trash talking passwords. Some claim they are on life support and will soon be obsolete. But in a world without passwords how can we secure our accounts? One answer is biometrics. Some familiar examples of biometrics are fingerprints or retinal scans. It’s genius, no more forgetting passwords, […]

2014 has been wrapped up – and with the end of the year comes a tallying of the year’s most popular passwords! Among these champions of defense against vicious thieves and scammers are: 12345678 in the number four slot! And then there’s 12345 in the number three position! In at number one is (drum roll) […]

2015 is here! Have you begun the year’s IT planning? Expiring licenses will need to be renewed. Old systems and technologies will need to be upgraded. Known vulnerabilities will need to be patched up. Unforseen threats will need to be anticipated.   Don’t lose sleep trying to handle it yourself, call the experts at RHYNO […]

Protecting your privacy in today’s connected world can be a full time job – at least. You may not be able to go completely dark to the data brokers and others who are out there in the jungle that is the internet, but you can take steps to protect yourself. CBS aired a great segment […]

As reported by Dan Goodin on Ars Technica, Jeremi Gosney, the founder and CEO of Stricture Consulting Group has just unveiled a five server system that is capable of brute force cracking any strong eight character password in about five and a half hours. This is four times faster than previous capabilities. The cluster of […]

This question has been iterated more times than I can recall over the years from computer users.  The candid answer is simple.  By using your computer you, the computer operator, allowed the virus in.  Beyond the firewalls and antivirus software the best and last line of defense against a virus is you, the computer operator. […]

Keeping Your Accounts Secure It seems that each new week brings another alert about hackers stealing account information and a warning to change your passwords. Having a strong password is not enough, criminals can get to your account through weaknesses that are outside of your control. Constantly changing passwords makes managing those passwords challenging. There […]