facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpgComputer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Windows Server 2003 End of Life Set to Hit Medium-Sized Businesses Hard

b2ap3_thumbnail_server_os_losing_support_400.jpgIs your business prepared for July 14th? No, we’re not referring to Bastille Day, although, you can’t go wrong with celebrating the French Revolution. Instead, we’re referring to Microsoft’s plans to end support for Windows Server 2003 on this quickly-approaching date. Being unprepared for July 14th will put your company’s data at serious risk.

0 Comments
Continue reading

Alert: Critical Microsoft Office Flaw Patched

b2ap3_thumbnail_Microsoft-Office-icon_400.jpg‘Tis the season for technology vulnerabilities and exploits. In addition to Sandworm and Cryptowall 2.0, another flaw has been found in Microsoft Office. This particular threat allows a hacker to gain control of a computer system, making it a dangerous and potentially threatening gamble for your business to ignore it. Thankfully, the issue has been patched, and the fix is now available to the public.

0 Comments
Continue reading

Warning: Updated Cryptowall Ransomware Strikes Again

b2ap3_thumbnail_ransomware_attack_400.jpgAs a business owner, you want to take every precaution against the latest threats that can affect your way of life. An updated threat called Cryptowall 2.0 (previously known as Cryptolocker) has been cut loose by malware developers, and it's capable of dealing irreparable damage to your business's network and data. This spear-phishing variant has the power to grind your network's files to dust, and in turn, your productivity.

0 Comments
Continue reading

Caution: New Bash Bug Vulnerability Might Leave You with Shellshock

b2ap3_thumbnail_bash_bug_vulnerability_400.jpgFor users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

0 Comments
Continue reading

Warning: New Botnet Threat Could Spell GameOver, Literally

b2ap3_thumbnail_gameover_botnet_400.jpgLook out, users of Windows; the Greek god of thunder is angry, and he's sent the Zeus family of malware out into the world. The one in question, GameOver Zeus, is particularly nasty. Thankfully, the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice managed to find a way to disrupt it, but that doesn't mean that GameOver Zeus is out of the game - in two weeks, the threat will return with a vengeance.

0 Comments
Continue reading

WARNING: Huge Vulnerability in Internet Explorer Affects Everybody, No Fix for XP

b2ap3_thumbnail_alert_red_400.jpgAlert! Those using Windows Internet Explorer as your preferred web browser might want to take a short break from it and consider using a different browser like Chrome or Firefox until Microsoft works out a recently-discovered vulnerability.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Hackers Business Management Hardware Microsoft Workplace Tips Network Security Backup Hosted Solutions Managed Service Provider Business Productivity Productivity Email Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration VoIP IT Support IT Support Quick Tips Data Backup Smartphones Mobile Devices communications Network Business Continuity Microsoft Office Gadgets Android Data Recovery Social Media Disaster Recovery Cybersecurity Upgrade Communication Mobile Office Server Smartphone Phishing Virtualization Mobile Device Management Miscellaneous Ransomware Vendor Management Holiday Operating System Tech Term Managed IT Services Outsourced IT Windows 10 Windows Passwords Apps Users Unified Threat Management Remote Monitoring Internet of Things Mobile Device Facebook BDR Automation BYOD Remote Computing Mobile Computing Apple Data Management Analytics Managed IT services WiFi Windows 10 Artificial Intelligence Cloud Computing The Internet of Things Training Marketing History Browser Save Money Firewall App Big data Business Technology Spam Help Desk Encryption Alert Information Technology Health Bandwidth IT Consultant Office 365 Office Two-factor Authentication Access Control Gmail Maintenance Government Printer Windows 7 Content Filtering Cybercrime Going Green Managed IT Hard Drives Bring Your Own Device Antivirus Budget Tech Support Recovery Virus Managed Service Employer-Employee Relationship Lithium-ion Battery Retail Best Practice Cost Management Hiring/Firing Information Saving Time Wireless Technology Computers Windows 8 Healthcare Outlook VPN Search Humor Update iPhone Data Security It Management Computing Blockchain Data Loss Money IBM Phone System Hacking Document Management Augmented Reality Project Management Travel Remote Work Customer Service Education Networking Covid-19 Hard Drive Wireless Regulations Avoiding Downtime Applications Risk Management Mobility Storage Website SaaS Conferencing Save Time Patch Management Downtime Value Vendor Law Enforcement Password Customer Relationship Management Solid State Drive Data Breach Current Events Hacker Compliance PowerPoint Computer Repair Running Cable Data storage Proactive IT Flexibility Administration Twitter Intranet Voice over Internet Protocol File Sharing Legal Google Maps DDoS Paperless Office Social Engineering Sports Net Neutrality Business Intelligence Disaster Word Digital Payment Hosted Solution End of Support Meetings Excel Router Robot Cooperation Scam Monitoring Private Cloud Securty Cortana Comparison Tablet Wi-Fi Telephony Company Culture Management Machine Learning Social Networking Black Market Digital Telephone Systems Cryptocurrency Vulnerabilities Websites User Laptop Virtual Desktop Business Growth Fax Server Software as a Service Social Uninterrupted Power Supply Streaming Media Office Tips Documents Vulnerability Teamwork Heating/Cooling Entertainment Managed Services Provider Inbound Marketing Distribution Politics Virtual Reality YouTube Bitcoin Emails Unified Communications Settings Data Protection Automobile How To Employee/Employer Relationship Pain Points Chrome Managed Services Chromebook Cost Downloads Managed IT Service Computing Infrastructure Hack How To Smart Devices eWaste IT service Computer Accessories Download Redundancy Processor Trending Microchip Taxes Bluetooth Co-managed IT Gaming Console Evernote User Error Processors Mouse Multi-factor Authentication Virtual Assistant USB Telephone Solutions Distributed Denial of Service Professional Services Webcam Presentation Programming Text Messaging Statistics Memory Start Menu Tech Terms Network Congestion Public Cloud Licensing Google Docs Integration Experience Mobile Technology Lifestyle Specifications Safety Cleaning Identity Theft Monitors Notifications CCTV Smart Phones Advertising Flash Digital Signature Unified Threat Management Backup and Disaster Recovery Analytic Proxy Server Azure Memes CIO Google Drive Windows Server 2008 Best Practives Recycling Username Modem Strategy Managing IT Services Windows XP Screen Reader Product Reviews Customer Resource management Electronic Medical Records Transportation Reliable Computing Staffing Google Wallet Spyware Mobile Payment Gamification Term Business Metrics Computer Malfunction Smart Tech Recording Optimization Leadership Telework Society Electricity Printing Microserver Piracy Upload Read Directions Display In Internet of Things Adminstration Pirating Information Surveillance Displays Remote Workers Fiber-Optic Database Dark Web Free Resource IT Micrsooft PDF HTML SSID Virtual Private Network Best Available Keyboard Telephone System Health IT Scalability Drones cache Television Get More Done Device Management Mobile Security Processing Motion Sickness Printer Server Multi-Factor Security Business Managemenet Logistics Virtual Machines Messenger Tracking FinTech WannaCry Turn Key Domains Software License Content Management Trends Wasting Time Development Cyber security Rental Service Data Storage Permissions Language Corporate Profile Public Speaking Fraud Tactics Bookmark Time Management Freedom of Information Trojan Devices Web Server Procurement Organize Shortcut Employer/Employee Relationships Cabling Upselling Assessment SharePoint UTM online Currency Content Google Play Telephone Service Tip of the week Entrepreneur Legislation Error Microsoft 365 Books Workers Music Google Calendar Troubleshooting IT Plan Enterprise Resource Planning Managing Costs Administrator Video Surveillance Video Conferencing switches Writing Medical IT Trend Micro Supercomputer Saving ZTime PCI DSS VoIP HIPAA email scam Addiction Browsers Communitications Upgrades Touchscreen News Environment Accountants LinkedIn A.I. Supply Chain Management LiFi Knowledge Competition User Tip Proactive Maintenance Worker Consultation Electronic Payment Security Cameras Threats Webinar Wireless Headphones Skype Reading Samsung Harddrive Technology Tips Business Owner Migration Archive Connected Devices Navigation Virtual Machine Debate Internet Service Provider Fleet Tracking eCommerce Employer Employee Relationship Regulations Compliance Work/Life Balance Audit IP Address Network Management Data Analysis Employees G Suite GPS IT Assessment Deep Learning Fake News Equifax Hacks Physical Security External Harddrive Remote Working Visible Light Communication Application Point of Contact SQL Server Data Warehousing Human Resources Device security MSP GDPR Managing Risk Emergency Hard Drive Disposal Nanotechnology Social Network Relocation Tablets Access Desktop Finance Tech Hypervisor Banking Botnet IT consulting Startup Asset Tracking Holidays Thin CLient Financial Data Computer Care Business Cards Service Level Agreement Fileless Malware Hybrid Cloud Sync 3D Ebay Electronic Health Records Microsoft Excel Managing Stress Personal Information Regulation CrashOverride Financial Capital Printers 3D Printing Productuvuty

toner1