RCL Systems Blog

RCL Systems has been serving the Bellaire area since 1986, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

One of the latest vulnerabilities in open-source software can be found in 7zip, a file archiver and decompresser. 7zip has been found to have several security vulnerabilities which have software developers rushing to fix their products. The damage done extends far beyond 7zip, reaching both people who use 7zip itself, and developers who have used the technology in the creation of their own tools and software.

2218 Hits
0 Comment
Continue reading

Forget Backdoors, Hackers Can Now Infiltrate Garage Doors

The contraption used to hack garage doors is built from a discontinued Mattel toy from 2007: the IM ME. The IM ME is a supposedly secure wireless instant messaging system that works similar to a mobile phone. It was meant to be a kid-friendly, secure alternative to a mobile phone for texting. The IM ME stores an address book for other users of IM ME, and used an Internet connection to communicate with each other. If you look at it now, you wouldn't be surprised to hear that it’s no longer supported and that it has no place in today’s computing world. Smartphones are largely more efficient and dynamic as communication tools. Just last year, it was discovered that the IM ME could be turned int...

2565 Hits
0 Comment
Continue reading

How and Why Cyber Crime is so Effective

b2ap3_thumbnail_cyber_crime_is_the_new_norm_400.jpg
The Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, it’s used for anonymous illegal activity, like drug trafficking or selling data on the black market.

2053 Hits
0 Comment
Continue reading

How a Hacker Could Potentially Assassinate a Hospital Patient

b2ap3_thumbnail_hack_threats_400.jpg
Whenever hackers show themselves, they always spell trouble. Whether it’s stealing credentials or completely taking over someone’s computer, a hacker has a plethora of targets and methods that can be irritating for the average PC user, or business executive. In fact, hackers are so crafty that they can even hack into hospital equipment.

2284 Hits
0 Comment
Continue reading

Alert: Hackers Posing as IT Support and Hijacking Computers

b2ap3_thumbnail_technology_take_400.jpg
One minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the provided phone number, which only makes the situation worse.

2360 Hits
0 Comment
Continue reading

Mobile? Grab this Article

QR Code

Customer Login


News & Updates

RCL Systems is proud to announce the launch of our new website at www.rcl.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what RCL Systems can do for your business.

RCL Systems
Houston, Texas