facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

0 Comments
Continue reading

The Internet Has a Field Day When AOL’s CEO Gets Hacked

The Internet Has a Field Day When AOL’s CEO Gets Hacked

If you’re the CEO of a mass media organization, you should know intimately well how brutal a hacking attack could be for your reputation. This happened to Tim Armstrong, the CEO of AOL. His Twitter account was posting 20 spam-filled tweets every second. As you can imagine, this is a problem for any business that wants to take itself seriously.

0 Comments
Continue reading

What Can We Learn From the Library of Congress’ Recent Hack Attack?

What Can We Learn From the Library of Congress’ Recent Hack Attack?

Believe it or not, there’s more news in Washington D.C. than matters concerning the upcoming election--namely the fact that the Library of Congress was struck by a DoS (Denial of Service) attack in July, supporting the members of government in their calls for an apparently much-needed update to the Library’s systems.

0 Comments
Continue reading

The Word “Hack” and Falcons Have More in Common Than You Would Think

b2ap3_thumbnail_origin_of_hacking_400.jpgThe word “hack” is a most peculiar word. When we use it, it’s often in the context of discussing a data breach. But did you know that “hack” has been a part of the English language since before computers and even electricity were a thing? Read on to learn more about the fascinating meanings of hack!

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Productivity Backup Business Managed Service Provider Hosted Solutions Email Productivity Malware IT Services Google Efficiency Saving Money Innovation Small Business Computer User Tips Collaboration Data Backup Quick Tips VoIP IT Support IT Support Network Smartphones Mobile Devices Business Continuity communications Data Recovery Gadgets Disaster Recovery Microsoft Office Android Cybersecurity Social Media Smartphone Upgrade Communication Mobile Office Server Phishing Virtualization Miscellaneous Mobile Device Management Ransomware Mobile Device Holiday Vendor Management Windows Passwords Users Operating System Apps Windows 10 BDR Tech Term Outsourced IT Managed IT Services Unified Threat Management Remote Monitoring Facebook Internet of Things BYOD Automation Apple Managed IT services Mobile Computing Analytics Data Management Remote Computing WiFi Windows 10 Artificial Intelligence Browser Training Marketing The Internet of Things History Cloud Computing Save Money Firewall Business Technology Health Alert Encryption Big data Spam Help Desk App Office IT Consultant Information Technology Covid-19 Managed Service Office 365 Budget Bandwidth Two-factor Authentication Gmail Content Filtering Government Going Green Cybercrime Access Control Windows 7 Bring Your Own Device Antivirus Blockchain Maintenance Hard Drives Printer VPN Managed IT Wi-Fi Lithium-ion Battery Information Best Practice Recovery Employer-Employee Relationship Healthcare Retail Remote Work Networking Outlook Windows 8 Cost Management Wireless Technology Hiring/Firing Search Virus Tech Support Saving Time Computers iPhone Project Management Travel Education Phone System Update IBM Augmented Reality It Management Data Security Hacking Money Computing Document Management Humor Data Loss Conferencing Customer Service Wireless Twitter Data storage Intranet Flexibility Voice over Internet Protocol Storage Website Laptop Current Events Risk Management Customer Relationship Management Legal PowerPoint Regulations Value Save Time Password Downtime Applications Hacker File Sharing Hard Drive SaaS Patch Management Vendor Administration Proactive IT Computer Repair Running Cable Mobility Law Enforcement Avoiding Downtime Data Breach Solid State Drive Compliance Meetings Digital Private Cloud Websites Black Market DDoS Management Cryptocurrency Excel Telephony Machine Learning Vulnerabilities Software as a Service Business Growth Net Neutrality Word Telephone Systems Chrome Business Intelligence Cortana Digital Payment Employee/Employer Relationship Fax Server Paperless Office Router Cooperation Sports Comparison Tablet Disaster Google Maps End of Support Hosted Solution Company Culture Scam Robot Social Networking User Social Engineering Securty Virtual Desktop Monitoring Social Documents How To Bluetooth Virtual Assistant Integration Teamwork Heating/Cooling Download Pain Points Entertainment Start Menu Multi-factor Authentication Tech Terms Streaming Media Memory Google Docs Mobile Technology Telephone User Error Microchip Taxes Experience Co-managed IT Managed Services Provider Monitors Distributed Denial of Service Cleaning Uninterrupted Power Supply How To eWaste Vulnerability Office Tips Public Cloud Licensing Bitcoin Gaming Console Managed Services YouTube Lifestyle Data Protection Managed IT Service Computer Accessories Identity Theft Webcam Unified Communications Settings Text Messaging Processors Notifications Downloads Distribution Trending USB Processor Mouse Virtual Reality Presentation Politics Automobile IT service Redundancy Emails Smart Devices Cost Inbound Marketing Statistics Solutions Chromebook Programming Specifications Safety Evernote Professional Services Computing Infrastructure Hack Employees Network Congestion Video Conferencing PCI DSS LiFi Trojan IT Plan Enterprise Resource Planning Printers SQL Server Digital Signature Rental Service Communitications Legislation Technology Tips Error GDPR Managing Risk Cabling Supply Chain Management email scam Addiction Fake News Web Server Organize Accountants Audit A.I. Tech Hypervisor Data Warehousing Recycling Holidays Administrator AI Work/Life Balance Fileless Malware Hybrid Cloud Analytic Books Workers Internet Service Provider Deep Learning Modem Strategy PDF Regulations Compliance Visible Light Communication Migration Emergency Connected Devices Hard Drive Disposal Proxy Server Azure Product Reviews Supercomputer IT Assessment Access Wireless Headphones Worker Remote Working IT consulting Network Management Microsoft Excel Electronic Medical Records Transportation Best Available Keyboard Upselling Equifax Computer Care Fleet Tracking Term Read Google Drive Windows Server 2008 Recording Optimization Supply Chains Webinar Device security MSP Directions Display Domains Reading Samsung Video Surveillance Mobile Payment Device Management Social Network SSID G Suite Saving ZTime Financial Data Advertising Flash Desktop Finance Dark Web Free Resource Public Speaking Employer Employee Relationship Electronic Health Records CIO Spyware Nanotechnology Windows XP Business Cards Service Level Agreement Health IT Business Managemenet Shortcut Hacks Physical Security Memes Staffing Google Wallet Electricity Startup Printing Asset Tracking Processing Content Management Managing IT Services Debate Displays Unified Threat Management Backup and Disaster Recovery Logistics Virtual Machines Entrepreneur Banking Botnet Harddrive Society Username Wasting Time Troubleshooting Relocation Tablets cache Screen Reader Television Customer Resource management online Currency Cyber security Environment Sync Telework Gamification Bookmark HIPAA GPS Surveillance Micrsooft Electronic Payment External Harddrive Remote Workers Best Practives Piracy Upload Employer/Employee Relationships Competition CCTV IT Drones WannaCry Smart Tech Google Play Telephone Service Reliable Computing Virtual Private Network Fiber-Optic Time Management Database Freedom of Information Microsoft 365 LinkedIn Business Metrics Computer Malfunction Corporate Profile HTML Managing Costs Business Owner Assessment SharePoint Telephone System Medical IT Trend Micro In Internet of Things Thin CLient FinTech Permissions Language Mobile Security Browsers IP Address 3D Development Ebay Microserver Human Resources Smart Phones Data Storage Software License Trends Tip of the week User Tip Proactive Maintenance Skype Application Multi-Factor Security Google Calendar Security Cameras Archive Threats Scalability Procurement switches Writing Get More Done Fraud Touchscreen Tactics News Motion Sickness Music VoIP Devices Navigation Virtual Machine Consultation eCommerce Leadership Organization Printer Server UTM Knowledge Content Data Analysis Point of Contact Messenger Tracking Adminstration Pirating Information Upgrades Turn Key Capital 3D Printing Productuvuty Personal Information Managing Stress Financial CrashOverride Regulation

toner1