facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

0 Comments
Continue reading

Tip of the Week: 3 Easy Ways to Max Out Your iPhone’s Battery Power

b2ap3_thumbnail_iphone_data_400.jpgSome business owners rely on their iPhone for a lot more than just work-related functions. With so many applications and whatnot consuming your phone’s processing power, your iPhone’s battery can quickly get drained. This, in turn, drains your productivity. If your phone is always dead, you can’t get much done with it. Shouldn’t there be a way to boost your battery’s efficiency?

0 Comments
Continue reading

Alert: Siri’s Leaking Secrets - iPhone Lock Screen Vulnerability

b2ap3_thumbnail_ios_vuln_400.jpgApple's iOS 7.1.1. operating system has been affected by a series of bugs throughout this month. The first bug was emails being sent unencrypted, but now a new threat lurks in the shadows - a lock screen flaw that allows hackers to access your contacts list without unlocking the phone.

0 Comments
Continue reading

Liven Up Your Office Routine with the New iPhone 5c and 5s

b2ap3_thumbnail_iphone5c400.jpgLast week, as Apple Inc. fans waited in anticipation for the new iPhone announcement, Apple delivered two different exciting models; the iPhone 5c and iPhone 5s. These products promise to introduce some great features and style to users this Fall. Let's take a look at how these new devices can liven your everyday office routine.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Malware Saving Money Hosted Solutions IT Services Efficiency IT Support Google Small Business User Tips Computer Mobile Devices Smartphones Innovation Quick Tips Gadgets Business Continuity Network Disaster Recovery VoIP Microsoft Office Social Media Productivity Android Data Backup Mobile Office Virtualization Collaboration Communication Server Smartphone Data Recovery Upgrade communications Mobile Device Management Miscellaneous Tech Term Cybersecurity IT Support Ransomware Windows 10 Unified Threat Management Phishing Windows Facebook Holiday Operating System Vendor Management Remote Monitoring Passwords Automation Apps Analytics Managed IT services BYOD Remote Computing Mobile Computing BDR Users WiFi Internet of Things The Internet of Things Mobile Device Marketing Data Management Apple Outsourced IT Firewall History Artificial Intelligence Browser Managed IT Services Save Money Alert App Cloud Computing Encryption IT Consultant Big data Spam Two-factor Authentication Gmail Bandwidth Bring Your Own Device Maintenance Printer Antivirus Windows 10 Office Health Office 365 Content Filtering Going Green Windows 8 Outlook Hiring/Firing Business Technology Hard Drives Managed IT Help Desk Wireless Technology Cybercrime Saving Time Virus Tech Support Search Cost Management Training Lithium-ion Battery Best Practice Information Technology Budget IBM Money It Management Document Management Blockchain Recovery Employer-Employee Relationship Computers VPN Travel Education Hacking Update Phone System Healthcare Access Control File Sharing Customer Service Law Enforcement Applications Hard Drive Augmented Reality Government Compliance Managed Service Mobility Website PowerPoint Data storage Running Cable Proactive IT Humor Administration Twitter Intranet Networking Legal Information Regulations Risk Management iPhone SaaS Save Time Social Robot Router Downtime Data Security Securty Customer Relationship Management Wireless Comparison Tablet Google Maps DDoS Fax Server Company Culture Patch Management Solid State Drive Data Loss Social Engineering Computer Repair Social Networking Flexibility Scam Black Market Word Retail Cryptocurrency Data Breach Laptop Business Growth Value Password Cortana Digital Project Management Avoiding Downtime Telephony Hacker Websites Management Machine Learning Vulnerabilities Telephone Systems Paperless Office Sports Current Events Disaster Business Intelligence User Computing Digital Payment End of Support Hosted Solution Excel Bitcoin Identity Theft Data Protection Windows 7 IT service Computer Accessories Documents Heating/Cooling Distribution Entertainment Lifestyle Trending Gaming Console Politics Storage Virtual Reality Emails Voice over Internet Protocol Bluetooth Conferencing Automobile Mouse Webcam Chromebook Text Messaging Computing Infrastructure Hack Statistics Programming Redundancy Google Docs Network Congestion Monitoring How To eWaste Download Evernote Private Cloud Experience Monitors Virtual Assistant Cleaning Office Tips Streaming Media Inbound Marketing Microchip Taxes Cooperation Processors Start Menu Tech Terms Distributed Denial of Service USB Mobile Technology YouTube Vendor Net Neutrality Pain Points Presentation Software as a Service Unified Communications Settings Co-managed IT Public Cloud Chrome User Error Uninterrupted Power Supply Virtual Desktop Specifications Safety Vulnerability Navigation Electricity Printing Upselling Username Solutions Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Gamification Notifications CCTV Digital Signature Professional Services Video Surveillance Screen Reader Customer Resource management online Currency Data Analysis Saving ZTime Piracy Upload Business Metrics Computer Malfunction Teamwork GDPR cache Television switches Writing Smart Tech Reliable Computing Music In Internet of Things LinkedIn Tech WannaCry Downloads Upgrades HTML Integration Fiber-Optic Database Corporate Profile Harddrive Mobile Security Time Management Freedom of Information LiFi Debate Telephone System PDF Fileless Malware Best Practives Software License Trends Motion Sickness Best Available Skype Keyboard Modem Assessment SharePoint GPS Multi-Factor Security Cost Scalability Archive Proxy Server Term Google Calendar Deep Learning Devices Messenger Tracking Electronic Medical Records Domains Microserver Tip of the week Work/Life Balance External Harddrive Fraud Tactics VoIP UTM Content Rental Service Meetings Point of Contact Public Speaking Recording Touchscreen News Visible Light Communication Memory Directions Thin CLient IT Plan Enterprise Resource Planning Web Server Shortcut SSID Consultation IT consulting 3D Ebay Legislation Error Cabling Dark Web Get More Done Knowledge Addiction Wi-Fi Administrator Entrepreneur Processing Printer Server Technology Tips Accountants A.I. Books Workers Troubleshooting Health IT Turn Key Smart Phones email scam Trojan Audit CIO Multi-factor Authentication Supercomputer HIPAA Analytic Logistics Fake News Advertising Flash Recycling Environment Managed IT Service Staffing Google Wallet Leadership Migration Connected Devices Product Reviews Competition Organize Data Warehousing Windows XP Adminstration Pirating Information Wireless Headphones Telephone Worker Electronic Payment Bookmark Network Management Google Play Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Read Emergency Hard Drive Disposal Society Processor Computer Care Micrsooft Device security MSP Employer Employee Relationship IP Address Microsoft 365 Microsoft Excel G Suite Drones Desktop Finance Hacks Physical Security Application Medical IT Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Device Management Browsers Human Resources Business Cards Service Level Agreement Banking Botnet Business Managemenet Security Cameras Webinar Spyware Mobile Payment Startup Asset Tracking Relocation Tablets Content Management User Tip Printers Managing Stress CrashOverride Regulation Transportation 3D Printing Capital Productuvuty

toner1