facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Windows Server 2003 End of Life Set to Hit Medium-Sized Businesses Hard

b2ap3_thumbnail_server_os_losing_support_400.jpgIs your business prepared for July 14th? No, we’re not referring to Bastille Day, although, you can’t go wrong with celebrating the French Revolution. Instead, we’re referring to Microsoft’s plans to end support for Windows Server 2003 on this quickly-approaching date. Being unprepared for July 14th will put your company’s data at serious risk.

0 Comments
Continue reading

Alert: Critical Microsoft Office Flaw Patched

b2ap3_thumbnail_Microsoft-Office-icon_400.jpg‘Tis the season for technology vulnerabilities and exploits. In addition to Sandworm and Cryptowall 2.0, another flaw has been found in Microsoft Office. This particular threat allows a hacker to gain control of a computer system, making it a dangerous and potentially threatening gamble for your business to ignore it. Thankfully, the issue has been patched, and the fix is now available to the public.

0 Comments
Continue reading

Warning: Updated Cryptowall Ransomware Strikes Again

b2ap3_thumbnail_ransomware_attack_400.jpgAs a business owner, you want to take every precaution against the latest threats that can affect your way of life. An updated threat called Cryptowall 2.0 (previously known as Cryptolocker) has been cut loose by malware developers, and it's capable of dealing irreparable damage to your business's network and data. This spear-phishing variant has the power to grind your network's files to dust, and in turn, your productivity.

0 Comments
Continue reading

Caution: New Bash Bug Vulnerability Might Leave You with Shellshock

b2ap3_thumbnail_bash_bug_vulnerability_400.jpgFor users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

0 Comments
Continue reading

Warning: New Botnet Threat Could Spell GameOver, Literally

b2ap3_thumbnail_gameover_botnet_400.jpgLook out, users of Windows; the Greek god of thunder is angry, and he's sent the Zeus family of malware out into the world. The one in question, GameOver Zeus, is particularly nasty. Thankfully, the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice managed to find a way to disrupt it, but that doesn't mean that GameOver Zeus is out of the game - in two weeks, the threat will return with a vengeance.

0 Comments
Continue reading

WARNING: Huge Vulnerability in Internet Explorer Affects Everybody, No Fix for XP

b2ap3_thumbnail_alert_red_400.jpgAlert! Those using Windows Internet Explorer as your preferred web browser might want to take a short break from it and consider using a different browser like Chrome or Firefox until Microsoft works out a recently-discovered vulnerability.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices User Tips Smartphones Quick Tips Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Network Android Social Media Collaboration Virtualization Productivity Data Backup Mobile Office Server Communication Smartphone Mobile Device Management Data Recovery Miscellaneous Upgrade Tech Term Ransomware Windows 10 communications Windows IT Support Unified Threat Management Facebook Holiday Remote Monitoring Operating System Passwords Phishing Cybersecurity Managed IT services Mobile Computing Vendor Management BYOD Remote Computing Apps Automation Users WiFi BDR Marketing Mobile Device Analytics The Internet of Things Data Management Apple Outsourced IT History Firewall Internet of Things Alert Artificial Intelligence Managed IT Services Browser Save Money App Big data Encryption IT Consultant Content Filtering Going Green Maintenance Bandwidth Office Printer Gmail Cloud Computing Bring Your Own Device Health Antivirus Spam Office 365 Saving Time Lithium-ion Battery Best Practice Information Technology Budget Two-factor Authentication Tech Support Managed IT Business Technology Virus Help Desk Wireless Technology Cybercrime Search Windows 10 Hiring/Firing Cost Management Hard Drives Training Windows 8 Outlook Healthcare Computers VPN Access Control Travel IBM Update Blockchain Recovery Employer-Employee Relationship Phone System Money Document Management Hacking SaaS Intranet File Sharing Twitter Customer Service Hard Drive Humor Law Enforcement Education Applications It Management Compliance Mobility Augmented Reality PowerPoint Government Managed Service Risk Management Website Data storage Save Time Administration Networking Legal Information Regulations Proactive IT Running Cable iPhone Computing Fax Server Disaster End of Support User Hosted Solution Robot Excel Social Securty Wireless Customer Relationship Management Google Maps Data Security Solid State Drive DDoS Social Engineering Patch Management Flexibility Black Market Data Loss Cryptocurrency Business Intelligence Scam Word Digital Payment Laptop Business Growth Router Downtime Data Breach Value Current Events Password Cortana Digital Comparison Tablet Project Management Websites Avoiding Downtime Machine Learning Hacker Management Company Culture Computer Repair Paperless Office Telephone Systems Sports Social Networking Statistics Software as a Service Pain Points Presentation Public Cloud Lifestyle Programming Network Congestion Uninterrupted Power Supply Virtual Desktop Vulnerability Identity Theft Specifications Safety IT service Bitcoin Streaming Media Data Protection Documents Politics Heating/Cooling Virtual Reality Entertainment Emails Bluetooth Gaming Console Cooperation Storage Automobile Chromebook Net Neutrality Conferencing Vendor Chrome Webcam Text Messaging Computing Infrastructure Hack Redundancy Retail How To Google Docs Download eWaste Private Cloud Monitoring Experience Computer Accessories Monitors Evernote Cleaning Office Tips Telephony Co-managed IT User Error Inbound Marketing Microchip Taxes Trending YouTube Mouse Start Menu Tech Terms Distributed Denial of Service Processors Mobile Technology USB Unified Communications Settings Vulnerabilities Proxy Server Hacks Physical Security Device security MSP Microsoft Excel Modem IP Address Licensing Drones Computer Care Desktop Finance Google Drive Windows Server 2008 Term Relocation Application Tablets Nanotechnology Social Network Point of Contact Electronic Medical Records Banking Botnet Human Resources Spyware Mobile Payment Directions Startup Asset Tracking Permissions Language Recording Sync Best Practives Business Cards Service Level Agreement Dark Web Notifications CCTV Username Upselling SSID Unified Threat Management Backup and Disaster Recovery Electricity Printing Gamification switches Recycling Writing Windows 7 Processing Digital Signature Reliable Computing Microserver Screen Reader Customer Resource management Music Analytic Health IT Video Surveillance Business Metrics Computer Malfunction Upgrades cache Television Managed IT Service Saving ZTime Teamwork Smart Tech Distribution Product Reviews In Internet of Things Piracy Upload WannaCry Downloads Bookmark HTML LiFi Get More Done Fiber-Optic Database Read PDF Motion Sickness Printer Server Mobile Security Time Management Freedom of Information Harddrive Google Play Scalability Turn Key Telephone System Corporate Profile Debate Device Management Deep Learning Assessment SharePoint Processor Best Available Messenger Keyboard Tracking Multi-Factor Security Cost Work/Life Balance GPS Trojan Software License Trends Google Calendar External Harddrive Browsers Rental Service Meetings Organize Devices Visible Light Communication Memory Business Managemenet Tip of the week Medical IT Domains Fraud Tactics Content Management Web Server UTM Content IT consulting Touchscreen News Security Cameras Public Speaking Cabling VoIP User Tip online Currency Consultation Navigation Thin CLient Books Shortcut Workers Legislation Error Knowledge 3D Ebay Wi-Fi Administrator IT Plan Enterprise Resource Planning CIO Technology Tips Smart Phones Data Analysis Entrepreneur Supercomputer Accountants A.I. Advertising Flash Virtual Assistant Professional Services Troubleshooting email scam Addiction Environment Webinar Multi-factor Authentication Windows XP LinkedIn Fake News GDPR HIPAA Worker Staffing Google Wallet Audit Displays Data Warehousing Tech Leadership Reading Competition Samsung Wireless Headphones Telephone Society Adminstration Pirating Information Electronic Payment Migration Connected Devices Micrsooft Archive Access Fileless Malware Employer Employee Relationship Equifax Fleet Tracking Skype Emergency Hard Drive Disposal Voice over Internet Protocol Business Owner G Suite Network Management Productuvuty Managing Stress CrashOverride Regulation 3D Printing Capital Printers

toner1