facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Windows Server 2003 End of Life Set to Hit Medium-Sized Businesses Hard

b2ap3_thumbnail_server_os_losing_support_400.jpgIs your business prepared for July 14th? No, we’re not referring to Bastille Day, although, you can’t go wrong with celebrating the French Revolution. Instead, we’re referring to Microsoft’s plans to end support for Windows Server 2003 on this quickly-approaching date. Being unprepared for July 14th will put your company’s data at serious risk.

0 Comments
Continue reading

Alert: Critical Microsoft Office Flaw Patched

b2ap3_thumbnail_Microsoft-Office-icon_400.jpg‘Tis the season for technology vulnerabilities and exploits. In addition to Sandworm and Cryptowall 2.0, another flaw has been found in Microsoft Office. This particular threat allows a hacker to gain control of a computer system, making it a dangerous and potentially threatening gamble for your business to ignore it. Thankfully, the issue has been patched, and the fix is now available to the public.

0 Comments
Continue reading

Warning: Updated Cryptowall Ransomware Strikes Again

b2ap3_thumbnail_ransomware_attack_400.jpgAs a business owner, you want to take every precaution against the latest threats that can affect your way of life. An updated threat called Cryptowall 2.0 (previously known as Cryptolocker) has been cut loose by malware developers, and it's capable of dealing irreparable damage to your business's network and data. This spear-phishing variant has the power to grind your network's files to dust, and in turn, your productivity.

0 Comments
Continue reading

Caution: New Bash Bug Vulnerability Might Leave You with Shellshock

b2ap3_thumbnail_bash_bug_vulnerability_400.jpgFor users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

0 Comments
Continue reading

Warning: New Botnet Threat Could Spell GameOver, Literally

b2ap3_thumbnail_gameover_botnet_400.jpgLook out, users of Windows; the Greek god of thunder is angry, and he's sent the Zeus family of malware out into the world. The one in question, GameOver Zeus, is particularly nasty. Thankfully, the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice managed to find a way to disrupt it, but that doesn't mean that GameOver Zeus is out of the game - in two weeks, the threat will return with a vengeance.

0 Comments
Continue reading

WARNING: Huge Vulnerability in Internet Explorer Affects Everybody, No Fix for XP

b2ap3_thumbnail_alert_red_400.jpgAlert! Those using Windows Internet Explorer as your preferred web browser might want to take a short break from it and consider using a different browser like Chrome or Firefox until Microsoft works out a recently-discovered vulnerability.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Hosted Solutions Saving Money Malware IT Services Efficiency Google IT Support Small Business User Tips Computer Innovation Mobile Devices Smartphones Quick Tips Business Continuity Gadgets VoIP Microsoft Office Network Disaster Recovery Social Media Android Data Backup Productivity Collaboration Communication Mobile Office Virtualization Smartphone Server communications Mobile Device Management Data Recovery Upgrade Miscellaneous Cybersecurity IT Support Tech Term Ransomware Windows 10 Phishing Unified Threat Management Windows Operating System Holiday Vendor Management Passwords Remote Monitoring Facebook Managed IT services BYOD Remote Computing Automation Mobile Computing Analytics Apps Users WiFi BDR Apple Mobile Device Outsourced IT Internet of Things Marketing The Internet of Things Data Management Artificial Intelligence Firewall History App Alert Managed IT Services Browser Save Money Encryption Cloud Computing IT Consultant Big data Office 365 Printer Health Content Filtering Two-factor Authentication Gmail Windows 10 Office Going Green Bring Your Own Device Bandwidth Spam Antivirus Maintenance Tech Support Virus Budget Saving Time Best Practice Information Technology Lithium-ion Battery Cybercrime Windows 8 Help Desk Outlook Wireless Technology Cost Management Search Hiring/Firing Managed IT Training Hard Drives Business Technology Blockchain Computers VPN Healthcare Travel Education Phone System Update IBM Recovery Employer-Employee Relationship Access Control Money Hacking Document Management It Management Running Cable Proactive IT File Sharing Information Hard Drive iPhone Mobility Intranet Legal Customer Service Twitter Networking Regulations Government Website Applications Risk Management SaaS Augmented Reality PowerPoint Managed Service Save Time Law Enforcement Administration Compliance Humor Data storage Computer Repair Flexibility Patch Management Black Market Management Cryptocurrency Avoiding Downtime Social Networking Data Loss User Scam Laptop Google Maps Vulnerabilities Business Growth Social Data Breach Wireless Social Engineering Digital Excel Project Management DDoS Current Events Websites Paperless Office Customer Relationship Management Sports Computing Disaster End of Support Word Hosted Solution Retail Business Intelligence Digital Payment Robot Telephony Router Downtime Machine Learning Value Fax Server Securty Password Cortana Telephone Systems Solid State Drive Hacker Comparison Tablet Data Security Company Culture USB Mouse Inbound Marketing Cooperation Identity Theft Presentation Programming Vendor Statistics Google Docs Network Congestion Virtual Desktop Redundancy Experience Specifications Safety Politics Cleaning Virtual Reality Pain Points Monitors Documents Evernote Automobile Office Tips Emails Streaming Media Heating/Cooling Virtual Assistant Chromebook Entertainment Computing Infrastructure Hack Storage YouTube Co-managed IT Unified Communications Settings How To User Error Start Menu Tech Terms Distribution Mobile Technology Private Cloud Net Neutrality Download Voice over Internet Protocol Chrome Software as a Service Gaming Console eWaste Conferencing Uninterrupted Power Supply IT service Webcam Lifestyle Vulnerability Microchip Taxes Text Messaging Computer Accessories Bitcoin Distributed Denial of Service Monitoring Windows 7 Data Protection Processors Bluetooth Public Cloud Trending WannaCry Downloads Relocation Tablets Smart Phones Microserver email scam Logistics Addiction Banking Botnet Business Owner Managed IT Service Accountants A.I. Archive Time Management Freedom of Information Work/Life Balance Sync IP Address Bookmark Multi-factor Authentication Corporate Profile Skype Deep Learning Pirating Information Human Resources Google Play Wireless Headphones Telephone Assessment SharePoint Visible Light Communication Memory Leadership Application Get More Done Migration Connected Devices Notifications CCTV Adminstration Fleet Tracking Point of Contact Google Calendar IT consulting Reliable Computing Turn Key Microsoft 365 Network Management Tip of the week Business Metrics Computer Malfunction Printer Server Processor Equifax Medical IT Touchscreen News In Internet of Things Trojan Browsers Device security MSP VoIP Organize Security Cameras Nanotechnology Social Network Consultation Advertising Flash Digital Signature User Tip Desktop Finance Knowledge CIO Navigation Startup Asset Tracking Analytic Technology Tips Windows XP Scalability Teamwork Business Cards Solutions Service Level Agreement Recycling Staffing Google Wallet Motion Sickness Messenger Tracking Unified Threat Management Professional Services Backup and Disaster Recovery Fake News Society Upselling Data Analysis Username Product Reviews Audit Displays Video Surveillance PDF GDPR Screen Reader Customer Resource management Read Data Warehousing Gamification Micrsooft Rental Service Meetings Webinar Tech Smart Tech Access Cabling Saving ZTime Best Available Keyboard Piracy Integration Upload Emergency Hard Drive Disposal Drones Web Server Books Workers Fiber-Optic Database Device Management Microsoft Excel Wi-Fi Administrator Domains Fileless Malware HTML Computer Care Debate Modem Telephone System Content Management Google Drive Windows Server 2008 Permissions Language Harddrive Public Speaking Proxy Server Mobile Security Business Managemenet Supercomputer Term Multi-Factor Security Cost Spyware Mobile Payment Worker Shortcut Electronic Medical Records Software License Trends GPS Electricity Printing switches Writing Reading Samsung External Harddrive Entrepreneur Fraud Recording Tactics online Currency Music Troubleshooting Directions Devices Environment SSID G Suite HIPAA Best Practives Dark Web UTM Content Upgrades Employer Employee Relationship Electronic Payment Processing Legislation Error cache Television LiFi Licensing Thin CLient Competition Health IT IT Plan Enterprise Resource Planning LinkedIn Hacks Physical Security 3D Ebay CrashOverride 3D Printing Capital Printers Productuvuty Managing Stress Transportation Regulation

toner1