facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Windows Server 2003 End of Life Set to Hit Medium-Sized Businesses Hard

b2ap3_thumbnail_server_os_losing_support_400.jpgIs your business prepared for July 14th? No, we’re not referring to Bastille Day, although, you can’t go wrong with celebrating the French Revolution. Instead, we’re referring to Microsoft’s plans to end support for Windows Server 2003 on this quickly-approaching date. Being unprepared for July 14th will put your company’s data at serious risk.

0 Comments
Continue reading

Alert: Critical Microsoft Office Flaw Patched

b2ap3_thumbnail_Microsoft-Office-icon_400.jpg‘Tis the season for technology vulnerabilities and exploits. In addition to Sandworm and Cryptowall 2.0, another flaw has been found in Microsoft Office. This particular threat allows a hacker to gain control of a computer system, making it a dangerous and potentially threatening gamble for your business to ignore it. Thankfully, the issue has been patched, and the fix is now available to the public.

0 Comments
Continue reading

Warning: Updated Cryptowall Ransomware Strikes Again

b2ap3_thumbnail_ransomware_attack_400.jpgAs a business owner, you want to take every precaution against the latest threats that can affect your way of life. An updated threat called Cryptowall 2.0 (previously known as Cryptolocker) has been cut loose by malware developers, and it's capable of dealing irreparable damage to your business's network and data. This spear-phishing variant has the power to grind your network's files to dust, and in turn, your productivity.

0 Comments
Continue reading

Caution: New Bash Bug Vulnerability Might Leave You with Shellshock

b2ap3_thumbnail_bash_bug_vulnerability_400.jpgFor users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

0 Comments
Continue reading

Warning: New Botnet Threat Could Spell GameOver, Literally

b2ap3_thumbnail_gameover_botnet_400.jpgLook out, users of Windows; the Greek god of thunder is angry, and he's sent the Zeus family of malware out into the world. The one in question, GameOver Zeus, is particularly nasty. Thankfully, the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice managed to find a way to disrupt it, but that doesn't mean that GameOver Zeus is out of the game - in two weeks, the threat will return with a vengeance.

0 Comments
Continue reading

WARNING: Huge Vulnerability in Internet Explorer Affects Everybody, No Fix for XP

b2ap3_thumbnail_alert_red_400.jpgAlert! Those using Windows Internet Explorer as your preferred web browser might want to take a short break from it and consider using a different browser like Chrome or Firefox until Microsoft works out a recently-discovered vulnerability.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Hackers Data Hardware Microsoft Workplace Tips Backup Network Security Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Computer Productivity Google User Tips IT Support Innovation Smartphones Small Business Data Backup Mobile Devices Quick Tips IT Support VoIP Network Collaboration Business Continuity Gadgets Microsoft Office communications Social Media Android Data Recovery Upgrade Disaster Recovery Server Mobile Office Cybersecurity Communication Virtualization Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Operating System Vendor Management Windows 10 Passwords Windows Tech Term Managed IT Services Unified Threat Management Remote Monitoring Apps Facebook Outsourced IT Internet of Things BDR Mobile Device Automation BYOD Remote Computing Managed IT services Apple Mobile Computing Data Management Analytics Users WiFi Windows 10 History Artificial Intelligence The Internet of Things Marketing Cloud Computing Browser Save Money Firewall Alert App Big data Help Desk Bandwidth IT Consultant Encryption Spam Training Office 365 Two-factor Authentication Business Technology Gmail Government Office Managed IT Health Cybercrime Content Filtering Information Technology Going Green Access Control Hard Drives Bring Your Own Device Maintenance Antivirus Printer Search VPN Virus Managed Service Tech Support Recovery Employer-Employee Relationship Retail Best Practice Information Lithium-ion Battery Cost Management Outlook Windows 8 Healthcare Hiring/Firing Budget Wireless Technology Windows 7 Saving Time Computers Blockchain Data Loss Travel Education Update Phone System iPhone Project Management Networking Hacking IBM Money Document Management Humor It Management Customer Service Wireless Law Enforcement Mobility Patch Management Intranet Twitter Conferencing Compliance Website Solid State Drive Data storage Avoiding Downtime Data Breach Risk Management Current Events Value Password Legal Save Time Hacker Downtime Customer Relationship Management Regulations Augmented Reality PowerPoint Proactive IT File Sharing SaaS Computing Running Cable Applications Hard Drive Administration Securty Social Engineering DDoS Storage Scam Voice over Internet Protocol Black Market Flexibility Monitoring Word Private Cloud Cryptocurrency Wi-Fi Digital Laptop Business Growth Telephony Websites Business Intelligence Management Cortana Excel Digital Payment Machine Learning Vulnerabilities Telephone Systems Router Cooperation Software as a Service Paperless Office Fax Server Comparison Tablet Vendor Sports Company Culture Disaster User Computer Repair Data Security Hosted Solution Virtual Desktop End of Support Social Networking Social Robot Google Maps Documents Downloads Politics Professional Services IT service Network Congestion Virtual Reality Teamwork Emails Heating/Cooling Automobile Entertainment Chromebook Integration Computing Infrastructure Hack Inbound Marketing Redundancy Bluetooth Streaming Media Smart Devices Meetings How To Download Managed Services Provider Evernote eWaste Google Docs Net Neutrality Pain Points Virtual Assistant Memory Experience Chrome User Error Multi-factor Authentication Co-managed IT Microchip Taxes Monitors Telephone Start Menu Tech Terms Cleaning Distributed Denial of Service Managed IT Service Mobile Technology Office Tips Computer Accessories Processors Lifestyle USB YouTube Public Cloud Licensing Uninterrupted Power Supply Processor Trending Presentation Gaming Console Vulnerability Unified Communications Settings Mouse Bitcoin Identity Theft Data Protection Webcam Specifications Safety Text Messaging Statistics Distribution Programming Data Analysis Employees WannaCry HTML Digital Signature eCommerce Point of Contact IT Fiber-Optic Database In Internet of Things Corporate Profile Music Get More Done Mobile Security Thin CLient GDPR Managing Risk Time Management switches Freedom of Information Writing Telephone System 3D Ebay SQL Server Development Turn Key Software License Trends Motion Sickness Smart Phones Tech Hypervisor Assessment SharePoint Upgrades Printer Server Multi-Factor Security Cost Scalability PDF Fileless Malware Hybrid Cloud Google Calendar Recycling Trojan Devices Messenger Tracking Holidays LiFi Tip of the week Analytic Fraud Tactics Proxy Server Azure VoIP UTM Content Rental Service Best Available Keyboard Leadership Modem Strategy Touchscreen News Product Reviews Organize Adminstration Pirating Information Read IT Plan Enterprise Resource Planning Web Server Term Consultation Deep Learning Legislation Error Cabling Domains Electronic Medical Records Transportation Knowledge Work/Life Balance Administrator Directions Display Technology Tips Accountants A.I. Books Workers Public Speaking Recording Optimization Visible Light Communication Communitications email scam Addiction Dark Web Free Resource Audit Device Management Supercomputer Shortcut SSID How To IT consulting Fake News Content Management Migration Connected Devices Entrepreneur Processing Managed Services Data Warehousing Business Managemenet Webinar Wireless Headphones Troubleshooting Worker Health IT Employee/Employer Relationship Network Management Environment Wasting Time Access CIO Equifax Fleet Tracking Reading HIPAA Samsung Upselling Logistics Virtual Machines Emergency Advertising Hard Drive Disposal Flash IT Assessment Video Surveillance Bookmark Staffing Computer Care Google Wallet online Currency Device security MSP Employer Employee Relationship Competition Cyber security Windows XP Microsoft Excel G Suite Electronic Payment Society Desktop Finance Hacks Physical Security Saving ZTime Google Play Telephone Service Google Drive Windows Server 2008 Displays Nanotechnology Social Network Business Owner Employer/Employee Relationships Business Cards Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Micrsooft LinkedIn Startup Asset Tracking Relocation Tablets IP Address Microsoft 365 Electronic Health Records Human Resources Debate Browsers Electricity Printing Drones Best Practives Username Application Harddrive Medical IT Trend Micro Memes Unified Threat Management Backup and Disaster Recovery Sync Archive Gamification Notifications CCTV Security Cameras Threats Skype Screen Reader Customer Resource management GPS User Tip Proactive Maintenance Microserver Piracy Upload Business Metrics Computer Malfunction External Harddrive Navigation Virtual Machine cache Television Smart Tech Reliable Computing Solutions Permissions Language Surveillance Managing Stress Printers CrashOverride Regulation Capital 3D Printing Personal Information Productuvuty Financial

toner1