HOSTING NEWS & TRENDS

Announcements and more from ReliableSite

How to download and install Mastodon on an Ubuntu server

Decentralized social networking platforms like Mastodon have gained popularity in recent years. Although similar to Twitter, this open-source platform is not hosted in one place. Each individual Mastodon dedicated server is an access point to a different community, also called an “instance”. With this tutorial, we are going to install Mastodon on Ubuntu, a Linux distribution.  If you plan to host a Mastodon dedicated server and create a community of your own, you will need to install Mastodon and also register a domain to get started. Mastodon is mainly written in Ruby and Javascript, which is what you will see in the steps below. This social platform offers some exciting features and is designed to provide a more user-controlled and community-driven experience. Let's get started! Install Mastodon on Ubuntu Let's dive into the steps to download and install Mastodon on an Ubuntu server. Installing Dependencies Our first step is installing dependencies, but before

Read more
How the RSocks Botnet Was Finally Shut Down

Botnet attacks have been on the rise for years, infecting devices across the globe, exploiting sensitive information, and even being used to launch distributed denial of service (DDoS) attacks. Specifically, botnet attacks are unique in the fact that they are carried out by several compromised IoT devices (ranging from smart speakers to video doorbells) to create an "army" of sorts. In 2017, the FBI identified a Russian botnet known as RSocks. Since then, the United States Department of Justice has been working diligently alongside law enforcement in Germany, the Netherlands, and the United Kingdom to take this botnet down. In June of 2022, they were finally successful. More About the RSocks Botnet The RSocks botnet was first discovered in 2017 when approximately 325,000 compromised IoT devices were found to have carried out many brute force attacks. These attacks involved guessing the passwords of users through numerous attempts. Once devices were

Read more
What Is Zorin OS? Is It Worth Trying?

Feeling overwhelmed in your search for the right operating system? Perhaps you're unhappy with your current Linux distro. Maybe you're thinking about making the switch from Windows or MacOS, but are feeling intimidated by the Linux platform. Regardless of where you're at in your search for the right operating system, Zorin OS may be worth a look. More About Zorin OS Specifically, Zorin OS is a distribution available for the open-source Linux operating system. As of May 2022, it is among the top 10 most popular Linux distros available. For those who are new to Linux or are hesitant about making the switch, Zorin OS can be a great starting point due to its user-friendly and familiar design. Based on Ubuntu, this distro offers an interface that is reminiscent of Windows but offers the unrivaled customization and enhanced security of the Linux platform. There are three versions of Zorin OS

Read more
How to Avoid Fake Windows 11 Upgrade Malware

Are you looking to upgrade your PC to Windows 11? If so, be careful about where you get your download. While Windows 11 has promised some significant (and much-needed) security improvements, some unexpected risks have also been accompanied. One of these risks that have been disguised is a major malware attack as a Windows 11 upgrade. With a better understanding of this fake Windows update virus and how to protect yourself, you can avoid falling victim to malware. More About the Fake Windows Update This supposed Windows 11 update appears to come from a legitimate Microsoft website, though if you look closely at the URL, the first "red flag" is that the web address is not a direct Windows URL. From there, unsuspecting users who have not noticed the faulty web address may click on the "download now" button and end up with a 1.5MB ZIP file that contains a

Read more
Signs of Hope During Ransomware Chaos: Life is Getting More Difficult for Malware Gangs

Ransomware attacks are a very real threat across the web. Individuals, small businesses, and large corporations alike have all fallen victim to these attacks – with ransom payouts often reaching six figures or more. However, even though instances of ransomware may be on the rise, experts are hopeful that we've collectively made it through the worst phase of these attacks. Government Bodies Stepping in to Make a Difference One of the biggest problems with ransomware attacks is that victims often see no other option besides paying the ransom to get their information back. Unfortunately, doing this only perpetuates the problem because attackers see these victims as easy targets that can be taken advantage of time and time again. Likewise, the decryption codes provided by hackers upon the payment of a ransom cannot always be trusted. Fortunately, government bodies such as the National Cyber Security Centre (NCSC) and the United States

Read more
How to Conduct a Password Audit

As much as you'd like to believe that your passwords are totally reliable, the reality is that passwords are less secure now than ever before. Across the web, hackers are using tools to crack passwords in a matter of seconds. From there, personal data, financial information, and other sensitive data are being compromised. If you're looking for a way to increase password security, one of the best things you can do is to conduct a password audit. This is something you can do on your own or as a company-wide practice to protect your data. Not sure where to start? We've got you covered. The Importance of Password Audits For starters, it's important to understand what a password audit is, what it entails, and why this practice is so important. Specifically, a password audit refers to a practice where specialized software is used to "test" your passwords against a variety

Read more
Phishing and Higher Education: What You Need to Know

Across the field of higher education, security threats run rampant. This is especially true as more schools than ever are relying on virtual/online platforms. Within the last couple of years especially, attacks on schools and other educational institutions have significantly increased. This is especially true regarding phishing attacks carried out against school faculty, administration, and students. University Phishing Attacks on the Rise The Federal Trade Commission (FTC) issued a consumer alert in April of 2021 after an increase in phishing attacks aimed at college students was discovered. Specifically, scammers have been emailing students and claiming to have important information about their tax refunds. These emails contain a link that, when clicked, asks for personal information that includes full names, Social Security numbers, birthdates, and even driver's license numbers. This information, if provided, is then used by hackers to steal identities. In some cases, personal information from students is being sold

Read more
Middleboxes for DDoS Attacks – How Do They Work?

Distributed denial of service (DDoS) attacks have been a well-known security threat for years – but in recent years, the size and scope of these attacks have increased many times over. Today, DDoS attacks are one of the most widespread threats on the Internet. And unfortunately, the effects of these attacks are becoming even more devastating as hackers begin utilizing a new strategy to maximize their impact. Specifically, hackers use middleboxes to amplify their attacks. By understanding this growing threat and what it entails, you can take the steps needed to avoid becoming a victim. What Are Middleboxes for DDoS Attacks? With a "traditional" DDoS attack, hackers flood a packet with traffic from multiple sources, with the ultimate goal being of overwhelming a server. Now, however, hackers realize that they can maximize the impact of their attacks by using an amplification strategy known as a middlebox. So, what are middleboxes?

Read more
Zero-Day Attacks – What Are They & Why Are They So Dangerous?

These days, it seems that it's more complicated than ever to keep your information safe on the web. Threats ranging from spyware and ransomware to phishing attacks and DDoS attacks keep web users on their toes. And when attacks are successful, the aftermath can be devastating for individuals and organizations alike. One type of concerning attack that we're beginning to see more of across the web is a zero-day attack. With a better understanding of these attacks, why they're so dangerous, and what mitigation options are available, you can take steps to keep your data safer. What is a Zero-Day Attack? Specifically, a zero-day attack refers to an attack that is carried out by hackers who are aware of a security vulnerability before the software's developers do. As a result, hackers can do a lot of damage before developers get a chance to pinpoint the vulnerability and come up with

Read more
How Firewall Appliances can be Targeted by Hackers

If you're like most computer users, you consider a firewall to be among your best lines of defense against online attacks. And up until recently, you would probably be right.  Unfortunately, recent events have revealed that firewall appliances, including wireless routers and other devices, can be just as vulnerable to malware attacks as any other Internet-connected device in your home or business. How Are Firewall Appliances Susceptible to Malware? In late February of 2022, it was announced that the notorious hacker group Sandworm had utilized malware (now known as Cyclops Blink) to infiltrate firewall devices sold by networking hardware company Watchguard. While the malware was just recently discovered, it has been tied back to firewall devices dating back to at least June of 2019. As of March 2022, it is suspected that the malware has infected devices across a wide range of countries, including: The United States Russia India Italy

Read more