facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Windows Server 2003 End of Life Set to Hit Medium-Sized Businesses Hard

b2ap3_thumbnail_server_os_losing_support_400.jpgIs your business prepared for July 14th? No, we’re not referring to Bastille Day, although, you can’t go wrong with celebrating the French Revolution. Instead, we’re referring to Microsoft’s plans to end support for Windows Server 2003 on this quickly-approaching date. Being unprepared for July 14th will put your company’s data at serious risk.

0 Comments
Continue reading

Alert: Critical Microsoft Office Flaw Patched

b2ap3_thumbnail_Microsoft-Office-icon_400.jpg‘Tis the season for technology vulnerabilities and exploits. In addition to Sandworm and Cryptowall 2.0, another flaw has been found in Microsoft Office. This particular threat allows a hacker to gain control of a computer system, making it a dangerous and potentially threatening gamble for your business to ignore it. Thankfully, the issue has been patched, and the fix is now available to the public.

0 Comments
Continue reading

Warning: Updated Cryptowall Ransomware Strikes Again

b2ap3_thumbnail_ransomware_attack_400.jpgAs a business owner, you want to take every precaution against the latest threats that can affect your way of life. An updated threat called Cryptowall 2.0 (previously known as Cryptolocker) has been cut loose by malware developers, and it's capable of dealing irreparable damage to your business's network and data. This spear-phishing variant has the power to grind your network's files to dust, and in turn, your productivity.

0 Comments
Continue reading

Caution: New Bash Bug Vulnerability Might Leave You with Shellshock

b2ap3_thumbnail_bash_bug_vulnerability_400.jpgFor users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

0 Comments
Continue reading

Warning: New Botnet Threat Could Spell GameOver, Literally

b2ap3_thumbnail_gameover_botnet_400.jpgLook out, users of Windows; the Greek god of thunder is angry, and he's sent the Zeus family of malware out into the world. The one in question, GameOver Zeus, is particularly nasty. Thankfully, the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice managed to find a way to disrupt it, but that doesn't mean that GameOver Zeus is out of the game - in two weeks, the threat will return with a vengeance.

0 Comments
Continue reading

WARNING: Huge Vulnerability in Internet Explorer Affects Everybody, No Fix for XP

b2ap3_thumbnail_alert_red_400.jpgAlert! Those using Windows Internet Explorer as your preferred web browser might want to take a short break from it and consider using a different browser like Chrome or Firefox until Microsoft works out a recently-discovered vulnerability.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Hackers Data Hardware Microsoft Workplace Tips Backup Managed Service Provider Network Security Productivity Business Hosted Solutions Email Malware Saving Money IT Services Efficiency Computer Google IT Support Productivity User Tips Innovation Small Business Smartphones Mobile Devices Quick Tips Data Backup Microsoft Office Business Continuity Collaboration Gadgets VoIP Social Media Network Disaster Recovery Data Recovery Android Upgrade Mobile Office Server communications IT Support Communication Virtualization Smartphone Miscellaneous Mobile Device Management Phishing Ransomware Tech Term Windows 10 Windows Cybersecurity Facebook Vendor Management Operating System Holiday Unified Threat Management Apps Remote Monitoring Automation Passwords Mobile Computing Managed IT services BDR Users Analytics Outsourced IT BYOD Remote Computing Managed IT Services Mobile Device WiFi Internet of Things Marketing The Internet of Things Data Management Artificial Intelligence Apple History Browser Firewall Save Money Alert App Big data Cloud Computing Encryption Spam Office 365 Help Desk Two-factor Authentication IT Consultant Content Filtering Information Technology Going Green Maintenance Windows 10 Printer Bring Your Own Device Health Antivirus Gmail Office Bandwidth Business Technology Cybercrime Windows 8 Outlook Best Practice Lithium-ion Battery Cost Management Hiring/Firing Hard Drives Tech Support Virus Budget Wireless Technology Computers Training Saving Time Search VPN Information Government Employer-Employee Relationship Managed IT Hacking IBM Managed Service Money Document Management Networking Customer Service Access Control Travel Phone System Education Healthcare It Management Recovery Update Blockchain Retail Data Loss Data storage Password Applications Value Save Time Downtime Hacker Humor Legal Augmented Reality PowerPoint Running Cable Proactive IT Regulations Administration SaaS Intranet Twitter Website Current Events File Sharing Hard Drive Law Enforcement Avoiding Downtime Compliance iPhone Mobility Risk Management Social Engineering Business Intelligence Scam Black Market Cortana Fax Server Flexibility Cryptocurrency Excel Digital Payment Router Data Breach Laptop Private Cloud Business Growth Customer Relationship Management Project Management Digital Comparison Tablet Company Culture Telephony Websites Machine Learning Computer Repair User Paperless Office Telephone Systems Social Networking Sports Social Management Disaster Wireless Computing Hosted Solution DDoS End of Support Storage Vulnerabilities Robot Data Security Securty Windows 7 Google Maps Patch Management Solid State Drive Word Pain Points Automobile eWaste Emails Net Neutrality Bluetooth Chromebook Chrome Lifestyle Redundancy Computing Infrastructure Hack Distribution How To Google Docs Memory Conferencing Experience Processors Download Computer Accessories Evernote Virtual Assistant Cleaning Wi-Fi USB Monitors Voice over Internet Protocol Gaming Console Office Tips Trending Presentation Monitoring Start Menu Tech Terms Microchip Taxes Mouse Specifications Safety Text Messaging Distributed Denial of Service Mobile Technology YouTube Virtual Desktop Webcam Unified Communications Settings Programming Statistics Software as a Service Public Cloud Licensing Network Congestion Uninterrupted Power Supply Documents Vulnerability Entertainment Teamwork Heating/Cooling Bitcoin Identity Theft Streaming Media Co-managed IT Data Protection Inbound Marketing User Error IT service Cooperation Vendor Virtual Reality Downloads Processor Politics Unified Threat Management Backup and Disaster Recovery Corporate Profile Browsers Username Time Management Freedom of Information LiFi Public Speaking Medical IT Screen Reader Customer Resource management User Tip Proactive Maintenance Motion Sickness Device Management Gamification Assessment SharePoint Shortcut Security Cameras Scalability Tip of the week Troubleshooting Work/Life Balance Solutions Content Management Piracy Upload Google Calendar Deep Learning Entrepreneur Navigation Virtual Machine Messenger Tracking Business Managemenet Smart Tech Upselling Fiber-Optic Database VoIP Environment Data Analysis Employees Rental Service Meetings HTML Best Practives Touchscreen News Visible Light Communication HIPAA Professional Services Cabling Telephone System Knowledge Electronic Payment SQL Server Video Surveillance Web Server online Currency Mobile Security Consultation IT consulting Competition GDPR Business Owner Integration Administrator Software License Trends Microserver Technology Tips Tech Hypervisor Saving ZTime Books Workers Multi-Factor Security Cost Flash IP Address Fraud Tactics Audit CIO Fileless Malware Hybrid Cloud Supercomputer LinkedIn Devices Fake News Advertising Worker Staffing Google Wallet Proxy Server Human Resources Azure Debate UTM Get More Done Content Data Warehousing Windows XP Application Modem Harddrive Error Emergency Hard Drive Disposal Society Electronic Medical Records Transportation GPS Archive IT Plan Enterprise Resource Planning Turn Key Access Displays Term Reading Samsung Skype Legislation Printer Server Recording G Suite email scam Addiction Computer Care Micrsooft Directions Display External Harddrive Employer Employee Relationship Accountants Trojan A.I. Microsoft Excel Point of Contact Organize Drones Dark Web Free Resource Hacks Physical Security Multi-factor Authentication Google Drive Windows Server 2008 Digital Signature SSID Wireless Headphones Telephone Health IT Employee/Employer Relationship 3D Ebay Banking Botnet Migration Connected Devices Spyware Mobile Payment Processing Thin CLient Relocation Tablets Permissions Language Logistics Sync Network Management Electricity Printing Managed IT Service Wasting Time Smart Phones Equifax Fleet Tracking Analytic PDF Bookmark Notifications CCTV Recycling Device security MSP Product Reviews Nanotechnology Webinar Social Network Music Employer/Employee Relationships Adminstration Pirating Information Business Metrics Computer Malfunction Desktop Finance cache Television switches Best Available Writing Keyboard Google Play Leadership Reliable Computing Domains Microsoft 365 In Internet of Things Business Cards Read Service Level Agreement WannaCry Upgrades Managing Costs Startup Asset Tracking Financial CrashOverride Printers Managing Stress 3D Printing Capital Regulation Managed Services Provider Productuvuty Personal Information

toner1