facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

0 Comments
Continue reading

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

0 Comments
Continue reading

$100 Million Hacking Incident Shows that No Company is Immune

$100 Million Hacking Incident Shows that No Company is Immune

It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

0 Comments
Continue reading

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Galaxy Note 7: Now With Exploding Batteries!

Galaxy Note 7: Now With Exploding Batteries!

Samsung has put out a global recall on their Galaxy Note 7 devices and a moratorium on any being sold after reports of exploding batteries came in. This recall--which is being considered the highest-profile recall in the history of consumer technology--comes at one of the worst possible times for the company, as they had just managed to gain some momentum after a run of mediocre mobile growth.

0 Comments
Continue reading

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

0 Comments
Continue reading

Alert: 27 Major Vulnerabilities Fixed By Microsoft. Is Your System Protected?

Alert: 27 Major Vulnerabilities Fixed By Microsoft. Is Your System Protected?

Microsoft’s latest round of security patches includes 27 software vulnerabilities, many of which are critical in nature. Affected are widely-used titles such as Windows, Microsoft Office, Internet Explorer, and the new Edge browser. It’s important for users to take action and install the Microsoft-provided patches, and soon.

0 Comments
Continue reading

Alert: Acer Customer Credentials Stolen. Is Your Data Safe?

Alert: Acer Customer Credentials Stolen. Is Your Data Safe?

If you made use of Acer’s online store to purchase a device between May 12, of 2015 and April 28, 2016, we have some bad news for you: There’s a chance you received a letter from Acer to inform you that your card’s credentials were stolen.

0 Comments
Continue reading

Google Condemns Adobe Flash to Online Oblivion

Google Condemns Adobe Flash to Online Oblivion

In the wake of a dangerous zero-day vulnerability found in Adobe Flash, which required that users either uninstall it or update to the latest version, it’s becoming increasingly apparent that the web needs to find a new way to support rich media integration. Now, Google plans on slowly phasing out Flash in its web browser, Google Chrome, and switch to HTML5 as the default rich media player.

0 Comments
Continue reading

Review This Checklist to Make Sure You’re Not Running Recently Expired Software

b2ap3_thumbnail_end_of_life_microsoft_support_400.jpgEvery piece of software released by Microsoft has an expiration date. Known as the End of Life event, this is when Microsoft ceases to support the software. It’s imperative that you stay on top of EOL dates for the sake of your company’s operations and data security. Take for example the dozens of software titles that expired just this past April.

0 Comments
Continue reading

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

0 Comments
Continue reading

It’s Time to Move On: Microsoft Pulls the Plug on Internet Explorer 8, 9, and 10

b2ap3_thumbnail_upgrade_to_new_ie_400.jpgIf you’re still using Windows 8 (instead of the much improved 8.1), we’ve got bad news for you. Microsoft has ceased offering patches and security updates for the Windows 8 operating system, which means that if you want to be using the most secure and up-to-date operating system, you should make the switch to Windows 8.1 or Windows 10.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

0 Comments
Continue reading

FBI Issues Warning About the Rise in DDoS Attacks

b2ap3_thumbnail_fbi_warns_ddos_400.jpgDo you know anyone affected by recent ransomware activity? The tragedy of Cryptolocker/Cryptowall, where files are locked down and returned in exchange for a ransom fee, might still be fresh in your minds. Well, the FBI warns that the end of cyber extortion is still far off, and that the next hacking technique that will be used is likely the DDoS attack.

0 Comments
Continue reading

Windows Server 2003 End of Support Date Fast Approaching

b2ap3_thumbnail_do_it_now_400.jpgTwelve years after its release, Microsoft has scheduled to end mainstream support for Windows Server 2003 on July 14, 2015. This move essentially pulls the plug on the popular operating system, leaving any business using the server OS after its end-of-support date vulnerable. If your organization is still running this outdated OS, you need to update ASAP.

0 Comments
Continue reading

How to Delete the Smelly Superfish App From Your Computer

b2ap3_thumbnail_superfish_one_400.jpgNormally, you can trust the software that comes preinstalled on a new computer. Unfortunately, this isn’t the case with the shopping-search app Superfish, which came installed on every Lenovo device sold between September and December 2014. If you’ve got the Superfish app on your computer, then you need to remove it before it does some superbad damages. Here’s how you do it.

0 Comments
Continue reading

Warning: Updated Cryptowall Ransomware Strikes Again

b2ap3_thumbnail_ransomware_attack_400.jpgAs a business owner, you want to take every precaution against the latest threats that can affect your way of life. An updated threat called Cryptowall 2.0 (previously known as Cryptolocker) has been cut loose by malware developers, and it's capable of dealing irreparable damage to your business's network and data. This spear-phishing variant has the power to grind your network's files to dust, and in turn, your productivity.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Innovation Small Business Collaboration IT Support Smartphones Data Backup VoIP IT Support Quick Tips Network Mobile Devices Business Continuity communications Gadgets Microsoft Office Android Social Media Data Recovery Upgrade Cybersecurity Disaster Recovery Mobile Office Server Communication Virtualization Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Vendor Management Tech Term Outsourced IT Passwords Operating System Windows Windows 10 Internet of Things Apps Unified Threat Management Remote Monitoring Facebook Users Mobile Device Managed IT Services Automation BDR BYOD Remote Computing Apple Mobile Computing Managed IT services Analytics Data Management Windows 10 WiFi Cloud Computing Artificial Intelligence Marketing The Internet of Things History Firewall Browser Save Money Training Alert App Big data Encryption Help Desk Office Two-factor Authentication Bandwidth Information Technology Spam Health Business Technology Office 365 IT Consultant Gmail Government Managed IT Content Filtering Cybercrime Maintenance Going Green Printer Access Control Hard Drives Bring Your Own Device Windows 7 Antivirus Budget Windows 8 Managed Service Outlook Recovery Best Practice Lithium-ion Battery Employer-Employee Relationship Retail Tech Support Virus Hiring/Firing Information Cost Management Wireless Technology Healthcare Saving Time Computers Search VPN Computing Travel Education Customer Service Update iPhone Project Management Humor IBM Money Document Management Hacking Augmented Reality Networking It Management Blockchain Phone System Data Loss Intranet SaaS Twitter Applications Wireless Avoiding Downtime Data Breach Law Enforcement Risk Management Conferencing Storage Website Solid State Drive Compliance Data storage Save Time Flexibility Downtime Value Customer Relationship Management Password File Sharing PowerPoint Legal Hacker Proactive IT Hard Drive Data Security Computer Repair Running Cable Regulations Covid-19 Mobility Patch Management Administration Current Events Virtual Desktop Scam Disaster End of Support Social Hosted Solution Meetings Robot Private Cloud Securty DDoS Fax Server Wi-Fi Digital Telephony Websites Net Neutrality Machine Learning Voice over Internet Protocol Business Intelligence Word Excel Digital Payment Black Market Monitoring Telephone Systems Software as a Service Cryptocurrency Router Cortana Laptop Comparison Tablet Business Growth Management Remote Work Company Culture Vulnerabilities Google Maps Cooperation Social Networking Paperless Office Vendor Social Engineering User Sports Co-managed IT User Error Chromebook Specifications Safety Redundancy Computing Infrastructure Hack Documents Inbound Marketing Distribution How To Streaming Media Smart Devices Evernote IT service Teamwork Heating/Cooling Professional Services Download Entertainment Virtual Assistant Lifestyle Pain Points Integration Chrome Bluetooth Start Menu Tech Terms Microchip Taxes Mobile Technology Distributed Denial of Service eWaste Managed Services Provider Computer Accessories Memory Public Cloud Licensing Uninterrupted Power Supply Google Docs Multi-factor Authentication Vulnerability Experience Monitors Managed Services Bitcoin Trending Cleaning Identity Theft Telephone Gaming Console Employee/Employer Relationship Processors Managed IT Service Mouse Data Protection Office Tips USB Webcam Text Messaging YouTube Politics Statistics Virtual Reality Presentation Downloads Programming Emails Processor Unified Communications Settings Automobile Network Congestion Browsers Assessment IT SharePoint Username Scalability Thin CLient Medical IT Trend Micro Remote Workers Drones Unified Threat Management Backup and Disaster Recovery Motion Sickness 3D Ebay Webinar Gamification Messenger Tracking Smart Phones Security Cameras Threats Virtual Private Network Tip of the week Screen Reader Customer Resource management User Tip Proactive Maintenance Google Calendar Piracy Upload Rental Service Navigation Virtual Machine Touchscreen Development News Recycling Permissions Language Smart Tech Digital Signature Solutions VoIP Analytic Pirating Information Data Analysis Employees Consultation HTML Cabling Leadership eCommerce Knowledge Product Reviews Fiber-Optic Database Web Server Adminstration Read switches Writing Mobile Security Books Workers GDPR Managing Risk Procurement Music Telephone System Administrator SQL Server Technology Tips Software License Trends Supercomputer PDF Tech Hypervisor Video Conferencing Fake News Multi-Factor Security Cost Audit Upgrades Fileless Malware Hybrid Cloud Communitications Data Warehousing Device Management LiFi Devices Worker Best Available Keyboard Holidays Best Practives Fraud Tactics Content Management UTM Content Reading Samsung Modem Strategy Emergency Supply Chain Management Hard Drive Disposal Business Managemenet Domains Proxy Server Azure Access IT Plan Enterprise Resource Planning Employer Employee Relationship Term Internet Service Provider Microsoft Excel Work/Life Balance Microserver Legislation Error G Suite Public Speaking Upselling Electronic Medical Records Transportation Computer Care Deep Learning Video Surveillance Directions Display Google Drive IT Assessment Windows Server 2008 online Currency Visible Light Communication Accountants A.I. Shortcut Recording Optimization email scam Addiction Hacks Physical Security Free Resource Spyware Mobile Payment IT consulting Relocation Tablets Entrepreneur Saving ZTime SSID How To Remote Working Get More Done Banking Botnet Troubleshooting Dark Web Printer Server Migration Connected Devices Environment Processing LinkedIn Turn Key Wireless Headphones Sync HIPAA Health IT Electricity Printing CCTV Electronic Payment Debate Wasting Time Electronic Health Records Advertising Flash Equifax Fleet Tracking Competition Harddrive Logistics Virtual Machines CIO Trojan Network Management Notifications Bookmark cache Memes Television Archive Windows XP Organize Device security MSP Reliable Computing Cyber security Skype Staffing Google Wallet Business Metrics Computer Malfunction Business Owner GPS Displays Desktop Finance External Harddrive Google Play Telephone Service Managing IT Services Society Nanotechnology Social Network In Internet of Things IP Address Employer/Employee Relationships WannaCry Service Level Agreement Human Resources Managing Costs Time Management Surveillance Freedom of Information Startup Asset Tracking Application Microsoft 365 Corporate Profile Point of Contact Micrsooft Business Cards Financial CrashOverride Managing Stress Printers Capital Regulation Productuvuty 3D Printing Personal Information

toner1