facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

0 Comments
Continue reading

The Internet Has a Field Day When AOL’s CEO Gets Hacked

The Internet Has a Field Day When AOL’s CEO Gets Hacked

If you’re the CEO of a mass media organization, you should know intimately well how brutal a hacking attack could be for your reputation. This happened to Tim Armstrong, the CEO of AOL. His Twitter account was posting 20 spam-filled tweets every second. As you can imagine, this is a problem for any business that wants to take itself seriously.

0 Comments
Continue reading

What Can We Learn From the Library of Congress’ Recent Hack Attack?

What Can We Learn From the Library of Congress’ Recent Hack Attack?

Believe it or not, there’s more news in Washington D.C. than matters concerning the upcoming election--namely the fact that the Library of Congress was struck by a DoS (Denial of Service) attack in July, supporting the members of government in their calls for an apparently much-needed update to the Library’s systems.

0 Comments
Continue reading

The Word “Hack” and Falcons Have More in Common Than You Would Think

b2ap3_thumbnail_origin_of_hacking_400.jpgThe word “hack” is a most peculiar word. When we use it, it’s often in the context of discussing a data breach. But did you know that “hack” has been a part of the English language since before computers and even electricity were a thing? Read on to learn more about the fascinating meanings of hack!

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Business Computing Cloud Software Business Management Hackers Data Hardware Microsoft Workplace Tips Backup Network Security Managed Service Provider Productivity Hosted Solutions Business Email Malware IT Services Saving Money Efficiency Computer IT Support Google User Tips Productivity Innovation Small Business Smartphones Mobile Devices Quick Tips VoIP Microsoft Office Business Continuity Data Backup Gadgets Social Media Collaboration communications Disaster Recovery IT Support Android Network Data Recovery Upgrade Mobile Office Server Communication Virtualization Mobile Device Management Smartphone Miscellaneous Phishing Cybersecurity Ransomware Windows 10 Windows Tech Term Holiday Operating System Vendor Management Unified Threat Management Apps Facebook Outsourced IT Managed IT Services Remote Monitoring Passwords Automation BYOD Remote Computing Managed IT services Mobile Computing BDR Analytics Users WiFi Mobile Device Internet of Things History Artificial Intelligence Apple Marketing Data Management The Internet of Things Browser Save Money Firewall Alert App Big data Help Desk IT Consultant Cloud Computing Encryption Spam Office 365 Two-factor Authentication Gmail Bandwidth Health Business Technology Office Cybercrime Content Filtering Information Technology Windows 10 Going Green Training Maintenance Printer Bring Your Own Device Antivirus Search VPN Managed Service Managed IT Government Employer-Employee Relationship Lithium-ion Battery Best Practice Outlook Windows 8 Cost Management Information Hiring/Firing Hard Drives Budget Wireless Technology Virus Tech Support Saving Time Computers It Management Travel Blockchain Education Phone System Recovery Update Retail Networking Hacking IBM Money Document Management Healthcare Access Control Customer Service Applications Hard Drive Law Enforcement Twitter Intranet Compliance Mobility Website Patch Management Avoiding Downtime Data Loss Data storage Current Events iPhone Risk Management Value Password Legal Save Time Hacker Downtime Regulations Augmented Reality Humor PowerPoint SaaS Running Cable Proactive IT File Sharing Administration Windows 7 Wireless Data Security Securty Google Maps DDoS Storage Solid State Drive Social Engineering Flexibility Scam Black Market Cryptocurrency Word Monitoring Data Breach Laptop Business Intelligence Private Cloud Cortana Business Growth Excel Digital Digital Payment Project Management Telephony Fax Server Websites Router Management Customer Relationship Management Machine Learning Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Sports Company Culture User Computing Computer Repair Disaster End of Support Social Networking Vendor Hosted Solution Robot Social IT service Network Congestion Documents Data Protection Teamwork Heating/Cooling Distribution Entertainment Downloads Politics Virtual Reality Emails Bluetooth Streaming Media Conferencing Automobile Inbound Marketing Chromebook User Error Redundancy Computing Infrastructure Hack Co-managed IT Net Neutrality Voice over Internet Protocol Pain Points Memory How To eWaste Google Docs Download Evernote Experience Chrome Monitors Virtual Assistant Cleaning Wi-Fi Office Tips Lifestyle Microchip Taxes Telephone Processors Start Menu Tech Terms Computer Accessories Mobile Technology YouTube Distributed Denial of Service USB Trending Presentation Gaming Console Software as a Service Unified Communications Settings Managed IT Service Cooperation Public Cloud Licensing Uninterrupted Power Supply Mouse Virtual Desktop Webcam Specifications Safety Text Messaging Vulnerability Statistics Bitcoin Programming Identity Theft Processor Gamification Notifications Medical IT CCTV Turn Key Digital Signature Point of Contact Screen Reader Customer Resource management Browsers Printer Server Threats Thin CLient cache Television switches Writing Smart Tech User Tip Reliable Computing Proactive Maintenance Trojan 3D Ebay Music Piracy Upload Business Metrics Security Cameras Computer Malfunction WannaCry Upgrades HTML Solutions Fiber-Optic Database Navigation In Internet of Things Virtual Machine Organize Smart Phones Mobile Security Professional Services Time Management Freedom of Information LiFi Analytic Telephone System Data Analysis Employees PDF Corporate Profile Recycling GDPR Motion Sickness Best Available Keyboard Leadership Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability SQL Server Adminstration Pirating Information Software License Trends Google Calendar Deep Learning Devices Messenger Integration Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics Tech Hypervisor UTM Content Rental Service Meetings Public Speaking Touchscreen News Visible Light Communication Fileless Malware Hybrid Cloud Webinar VoIP Modem Web Server Shortcut Consultation IT consulting Legislation Error Proxy Server Azure Cabling Knowledge Device Management IT Plan Enterprise Resource Planning Technology Tips Business Managemenet Accountants A.I. Electronic Medical Records Books Transportation Workers Troubleshooting Content Management email scam Addiction Term Administrator Managed Services Provider Entrepreneur Multi-factor Authentication Recording Supercomputer HIPAA Upselling Fake News Advertising Flash Directions Display Environment Audit CIO Connected Devices SSID Competition Data Warehousing Windows XP Wireless Headphones Dark Web Free Resource Worker Electronic Payment Video Surveillance Staffing Google Wallet online Currency Migration Saving ZTime Access Displays Equifax Fleet Tracking Health IT Reading Employee/Employer Relationship Samsung Best Practives Business Owner Emergency Hard Drive Disposal Society Network Management Processing Managed Services Micrsooft LinkedIn Device security MSP Logistics Employer Employee Relationship IP Address Microsoft Excel G Suite Wasting Time Computer Care Desktop Finance Hacks Physical Security Microserver Application Harddrive Google Drive Windows Server 2008 Nanotechnology Social Network Bookmark Human Resources Debate Drones Spyware Mobile Payment Skype Startup Asset Tracking Relocation Employer/Employee Relationships Tablets GPS Archive Business Cards Service Level Agreement Banking Google Play Botnet Telephone Service Printing Username Microsoft 365 Get More Done Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Managing Costs External Harddrive Electricity Financial Managing Stress Printers CrashOverride Regulation 3D Printing Capital Productuvuty Personal Information

toner1